A survey of research progress and development tendency of attribute-based encryption

25Citations
Citations of this article
39Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

With the development of cryptography, the attribute-based encryption (ABE) draws widespread attention of the researchers in recent years. The ABE scheme, which belongs to the public key encryption mechanism, takes attributes as public key and associates them with the ciphertext or the user's secret key. It is an efficient way to solve open problems in access control scenarios, for example, how to provide data confidentiality and expressive access control at the same time. In this paper, we survey the basic ABE scheme and its two variants: the key-policy ABE (KP-ABE) scheme and the ciphertext-policy ABE (CP-ABE) scheme. We also pay attention to other researches relating to the ABE schemes, including multiauthority, user/attribute revocation, accountability, and proxy reencryption, with an extensive comparison of their functionality and performance. Finally, possible future works and some conclusions are pointed out. © 2014 Liaojun Pang et al.

Cite

CITATION STYLE

APA

Pang, L., Yang, J., & Jiang, Z. (2014). A survey of research progress and development tendency of attribute-based encryption. Scientific World Journal. Hindawi Publishing Corporation. https://doi.org/10.1155/2014/193426

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free