Presentation | 2010-07-02 Attribute-based encryption with arbitrary number of authorities Go OHTAKE, Hiroshi DOI, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | Ciphertext-Policy Attribute-Based Encryption (CP-ABE) allows to encrypt data under an access policy including attributes. Such ciphertexts can be decrypted by anyone with a set of attributes that satisfy the policy. Recently, Muller et al. proposed Distributed Attribute-Based Encryption (DABE), where an arbitrary number of authorities can be present to maintain attributes and their corresponding secret keys. However, their scheme requires one trusted authority that maintains users and any ciphertext can be decrypted by the authority. In this paper, we propose a ciphertext-policy attribute-based encryption scheme where an arbitrary number of attribute authorities can be present. Our scheme is more secure than the Muller et al.'s scheme, since there exists no authority that can decrypt any ciphertext. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | Attribute-Based Encryption / Ciphertext-Policy / Multi-Authority |
Paper # | ISEC2010-30,SITE2010-26,ICSS2010-36 |
Date of Issue |
Conference Information | |
Committee | ICSS |
---|---|
Conference Date | 2010/6/24(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Information and Communication System Security (ICSS) |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | Attribute-based encryption with arbitrary number of authorities |
Sub Title (in English) | |
Keyword(1) | Attribute-Based Encryption |
Keyword(2) | Ciphertext-Policy |
Keyword(3) | Multi-Authority |
1st Author's Name | Go OHTAKE |
1st Author's Affiliation | NHK Science and Technology Research Laboratories:Institute of Information Security() |
2nd Author's Name | Hiroshi DOI |
2nd Author's Affiliation | Institute of Information Security |
Date | 2010-07-02 |
Paper # | ISEC2010-30,SITE2010-26,ICSS2010-36 |
Volume (vol) | vol.110 |
Number (no) | 115 |
Page | pp.pp.- |
#Pages | 6 |
Date of Issue |