eprint.iacr.org/archive/2007/461/20080120:083955

Preview meta tags from the eprint.iacr.org website.

Linked Hostnames

5

Thumbnail

Search Engine Appearance

Google

https://eprint.iacr.org/archive/2007/461/20080120:083955

Verifiable Attribute-based Encryption

Abstract. In this paper, we construct two verifiable attribute-based encryption schemes. One is for a single authority ABE, and the other is for a multi authority ABE. Not only our schemes are proved secure as the previous ABE schemes, they also provide a verifiable property. Adding the verification property has at least two advantages: first, it allows the user to immediately check the correctness of the keys which later would be used to decrypt all authorized ciphertexts at any time, and second, if the keys pass the verification but the user still does not rightly decrypt out the message, something might be wrong with the attributes or ciphertexts. We formalize the notion of verifiable attribute-based encryption and prove our schemes in our model.



Bing

Verifiable Attribute-based Encryption

https://eprint.iacr.org/archive/2007/461/20080120:083955

Abstract. In this paper, we construct two verifiable attribute-based encryption schemes. One is for a single authority ABE, and the other is for a multi authority ABE. Not only our schemes are proved secure as the previous ABE schemes, they also provide a verifiable property. Adding the verification property has at least two advantages: first, it allows the user to immediately check the correctness of the keys which later would be used to decrypt all authorized ciphertexts at any time, and second, if the keys pass the verification but the user still does not rightly decrypt out the message, something might be wrong with the attributes or ciphertexts. We formalize the notion of verifiable attribute-based encryption and prove our schemes in our model.



DuckDuckGo

https://eprint.iacr.org/archive/2007/461/20080120:083955

Verifiable Attribute-based Encryption

Abstract. In this paper, we construct two verifiable attribute-based encryption schemes. One is for a single authority ABE, and the other is for a multi authority ABE. Not only our schemes are proved secure as the previous ABE schemes, they also provide a verifiable property. Adding the verification property has at least two advantages: first, it allows the user to immediately check the correctness of the keys which later would be used to decrypt all authorized ciphertexts at any time, and second, if the keys pass the verification but the user still does not rightly decrypt out the message, something might be wrong with the attributes or ciphertexts. We formalize the notion of verifiable attribute-based encryption and prove our schemes in our model.

  • General Meta Tags

    10
    • title
      Verifiable Attribute-based Encryption
    • charset
      utf-8
    • viewport
      width=device-width, initial-scale=1, shrink-to-fit=no
    • citation_title
      Verifiable Attribute-based Encryption
    • citation_journal_title
      Cryptology ePrint Archive
  • Open Graph Meta Tags

    7
    • og:image
      https://eprint.iacr.org/img/iacrlogo.png
    • og:image:alt
      IACR logo
    • og:url
      https://eprint.iacr.org/2007/461
    • og:site_name
      IACR Cryptology ePrint Archive
    • og:type
      article
  • Link Tags

    4
    • apple-touch-icon
      /img/apple-touch-icon-180x180.png
    • shortcut icon
      /favicon.ico
    • stylesheet
      /css/dist/css/bootstrap.min.css
    • stylesheet
      /css/eprint.css?v=10

Links

26