
eprint.iacr.org/archive/2007/461/20080120:083955
Preview meta tags from the eprint.iacr.org website.
Linked Hostnames
5- 22 links toeprint.iacr.org
- 1 link tocreativecommons.org
- 1 link toia.cr
- 1 link toiacr.org
- 1 link towww.iacr.org
Thumbnail

Search Engine Appearance
Verifiable Attribute-based Encryption
Abstract. In this paper, we construct two verifiable attribute-based encryption schemes. One is for a single authority ABE, and the other is for a multi authority ABE. Not only our schemes are proved secure as the previous ABE schemes, they also provide a verifiable property. Adding the verification property has at least two advantages: first, it allows the user to immediately check the correctness of the keys which later would be used to decrypt all authorized ciphertexts at any time, and second, if the keys pass the verification but the user still does not rightly decrypt out the message, something might be wrong with the attributes or ciphertexts. We formalize the notion of verifiable attribute-based encryption and prove our schemes in our model.
Bing
Verifiable Attribute-based Encryption
Abstract. In this paper, we construct two verifiable attribute-based encryption schemes. One is for a single authority ABE, and the other is for a multi authority ABE. Not only our schemes are proved secure as the previous ABE schemes, they also provide a verifiable property. Adding the verification property has at least two advantages: first, it allows the user to immediately check the correctness of the keys which later would be used to decrypt all authorized ciphertexts at any time, and second, if the keys pass the verification but the user still does not rightly decrypt out the message, something might be wrong with the attributes or ciphertexts. We formalize the notion of verifiable attribute-based encryption and prove our schemes in our model.
DuckDuckGo

Verifiable Attribute-based Encryption
Abstract. In this paper, we construct two verifiable attribute-based encryption schemes. One is for a single authority ABE, and the other is for a multi authority ABE. Not only our schemes are proved secure as the previous ABE schemes, they also provide a verifiable property. Adding the verification property has at least two advantages: first, it allows the user to immediately check the correctness of the keys which later would be used to decrypt all authorized ciphertexts at any time, and second, if the keys pass the verification but the user still does not rightly decrypt out the message, something might be wrong with the attributes or ciphertexts. We formalize the notion of verifiable attribute-based encryption and prove our schemes in our model.
General Meta Tags
10- titleVerifiable Attribute-based Encryption
- charsetutf-8
- viewportwidth=device-width, initial-scale=1, shrink-to-fit=no
- citation_titleVerifiable Attribute-based Encryption
- citation_journal_titleCryptology ePrint Archive
Open Graph Meta Tags
7- og:imagehttps://eprint.iacr.org/img/iacrlogo.png
- og:image:altIACR logo
- og:urlhttps://eprint.iacr.org/2007/461
- og:site_nameIACR Cryptology ePrint Archive
- og:typearticle
Link Tags
4- apple-touch-icon/img/apple-touch-icon-180x180.png
- shortcut icon/favicon.ico
- stylesheet/css/dist/css/bootstrap.min.css
- stylesheet/css/eprint.css?v=10
Links
26- https://creativecommons.org/licenses/by/4.0
- https://eprint.iacr.org
- https://eprint.iacr.org/2007/461
- https://eprint.iacr.org/about.html
- https://eprint.iacr.org/archive/2007/461/1200818395.pdf