Decentralized Attribute-Based Encryption and Signatures
نویسندگان
چکیده
منابع مشابه
Decentralized Attribute-Based Signatures
We present the first decentralized multi-authority attributebased signature (DMA-ABS) scheme, in which no central authority and no trusted setup are required. The proposed DMA-ABS scheme for a large class of (non-monotone) predicates is fully secure (adaptive-predicate unforgeable and perfectly private) under a standard assumption, the decisional linear (DLIN) assumption, in the random oracle m...
متن کاملDecentralized Traceable Attribute-Based Signatures
Attribute-based signatures allow a signer owning a set of attributes to anonymously sign a message w.r.t. some signing policy. A recipient of the signature is convinced that a signer with a set of attributes satisfying the signing policy has indeed produced the signature without learning the identity of the signer or which set of attributes was used in the signing. Traceable attribute-based sig...
متن کاملPPDCP-ABE: Privacy-Preserving Decentralized Cipher-Policy Attribute-Based Encryption
Cipher-policy attribute-based encryption (CP-ABE) is a more efficient and flexible encryption system as the encryptor can control the access structure when encrypting a message. In this paper, we propose a privacy-preserving decentralized CP-ABE (PPDCP-ABE) scheme where the central authority is not required, namely each authority can work independently without the cooperation to initialize the ...
متن کاملDecentralized Ciphertext-Policy Attribute-Based Encryption: A Post-Quantum Construction
In Ciphertext Policy Attribute-Based Encryption (CP-ABE) system, a set of attributes is associated with the private keys of each user. Also, the ciphertext is attached with a policy which is defined over that set of attributes. A user can decrypt the ciphertext if the ciphertext’s policy is satisfied by the attributes associated hith her private key. Traditional CP-ABE schemes, based on number ...
متن کاملAttribute-based encryption implies identity-based encryption
In this short paper we formally prove that designing attribute-based encryption schemes cannot be easier than designing identity-based encryption schemes. In more detail, we show how an attribute-based encryption scheme which admits, at least, AND policies can be combined with a collision-resistant hash function to obtain an identity-based encryption scheme. Even if this result may seem natural...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
سال: 2020
ISSN: 0916-8508,1745-1337
DOI: 10.1587/transfun.2019cip0008