Advanced Search
Volume 34 Issue 2
Mar.  2012
Turn off MathJax
Article Contents
Wang Hai-Bin, Chen Shao-Zhen. Attribute-based Encryption with Hidden Access Structures[J]. Journal of Electronics & Information Technology, 2012, 34(2): 457-461. doi: 10.3724/SP.J.1146.2011.00682
Citation: Wang Hai-Bin, Chen Shao-Zhen. Attribute-based Encryption with Hidden Access Structures[J]. Journal of Electronics & Information Technology, 2012, 34(2): 457-461. doi: 10.3724/SP.J.1146.2011.00682

Attribute-based Encryption with Hidden Access Structures

doi: 10.3724/SP.J.1146.2011.00682 cstr: 32379.14.SP.J.1146.2011.00682
  • Received Date: 2011-07-06
  • Rev Recd Date: 2011-10-25
  • Publish Date: 2012-02-19
  • Using dual system encryption, a attribute-based encryption scheme with hidden access structures is proposed in prime order bilinear group in this paper. The scheme relies on the D-Linear and Decision Bilinear Diffie-Hellman (DBDH) assumptions, and is proven fully secure under standard model. Moreover, it is suitable for the system with lower storage devices and higher efficiency computations because it achieves constant size private key and constant length of pairing computations.
  • loading
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (2626) PDF downloads(1298) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return