作者
Kai Zhang, Junqing Gong, Shaohua Tang, Jie Chen, Xiangxue Li, Haifeng Qian, Zhenfu Cao
发表日期
2016/5/30
图书
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security
页码范围
269-279
简介
In cloud computing, computationally weak users are always willing to outsource costly computations to a cloud, and at the same time they need to check the correctness of the result provided by the cloud. Such activities motivate the occurrence of verifiable computation (VC). Recently, Parno, Raykova and Vaikuntanathan showed any VC protocol can be constructed from an attribute-based encryption (ABE) scheme for a same class of functions. In this paper, we propose two practical and efficient semi-adaptively secure key-policy attribute-based encryption (KP-ABE) schemes with constant-size ciphertexts. The semi-adaptive security requires that the adversary designates the challenge attribute set after it receives public parameters but before it issues any secret key query, which is stronger than selective security guarantee. Our first construction deals with small universe while the second one supports large universe. Both …
引用总数
201620172018201920202021202220231332355
学术搜索中的文章
K Zhang, J Gong, S Tang, J Chen, X Li, H Qian, Z Cao - Proceedings of the 11th ACM on Asia Conference on …, 2016