Fully secure online/offline predicate and attribute-based encryption

19Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This paper presents the first fully secure online/offline predicate encryption (PE) and attribute-based encryption (ABE) schemes that split the computation required for encryption into two phases: A preparation phase that does the vast majority of the work to encrypt a message before knowing the actual message and the attributes or access control policy that will be used. A second phase can then rapidly assemble a ciphertext when the specifications become known. Our PE schemes support generalized inner-product predicates, while, our ABE scheme supports non-monotone access structures. All the proposed schemes are unbounded in the sense that the size of the public parameters is constant. The security of all the schemes are based on the Decisional Linear assumption. The best part of our constructions is that they exhibit better online performance despite of providing stronger security guarantees compared to the existing work.

Cite

CITATION STYLE

APA

Datta, P., Dutta, R., & Mukhopadhyay, S. (2015). Fully secure online/offline predicate and attribute-based encryption. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 9065, pp. 331–345). Springer Verlag. https://doi.org/10.1007/978-3-319-17533-1_23

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free