Paper Abstract and Keywords |
Presentation |
2010-05-21 15:20
An Improvement of Attribute-based Encryption Hiroki Kunitake, Masahiro Mambo, Eiji Okamoto (Tsukuba Univ.) ISEC2010-6 |
Abstract |
(in Japanese) |
(See Japanese page) |
(in English) |
Attribute-Based Encryption(ABE) allows only entities having a specified set of attributes can decrypt ciphertexts. ABE is applicable to access control such as the file sharing systems, because multiple entities can be granted for the decryption of a ciphertext. We propose an improved ABE scheme that is more efficient than previous one and give a proof of the chosen plaintext security under the standard model. |
Keyword |
(in Japanese) |
(See Japanese page) |
(in English) |
Attribute-Based Encryption / k-out-of-n Secret Sharing / Access Control / Public-Key Encryption / / / / |
Reference Info. |
IEICE Tech. Rep., vol. 110, no. 44, ISEC2010-6, pp. 33-39, May 2010. |
Paper # |
ISEC2010-6 |
Date of Issue |
2010-05-14 (ISEC) |
ISSN |
Print edition: ISSN 0913-5685 Online edition: ISSN 2432-6380 |
Copyright and reproduction |
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034) |
Download PDF |
ISEC2010-6 |
Conference Information |
Committee |
ISEC |
Conference Date |
2010-05-21 - 2010-05-21 |
Place (in Japanese) |
(See Japanese page) |
Place (in English) |
Kikai-Shinko-Kaikan Bldg. |
Topics (in Japanese) |
(See Japanese page) |
Topics (in English) |
|
Paper Information |
Registration To |
ISEC |
Conference Code |
2010-05-ISEC |
Language |
Japanese |
Title (in Japanese) |
(See Japanese page) |
Sub Title (in Japanese) |
(See Japanese page) |
Title (in English) |
An Improvement of Attribute-based Encryption |
Sub Title (in English) |
|
Keyword(1) |
Attribute-Based Encryption |
Keyword(2) |
k-out-of-n Secret Sharing |
Keyword(3) |
Access Control |
Keyword(4) |
Public-Key Encryption |
Keyword(5) |
|
Keyword(6) |
|
Keyword(7) |
|
Keyword(8) |
|
1st Author's Name |
Hiroki Kunitake |
1st Author's Affiliation |
Tsukuba University (Tsukuba Univ.) |
2nd Author's Name |
Masahiro Mambo |
2nd Author's Affiliation |
Tsukuba University (Tsukuba Univ.) |
3rd Author's Name |
Eiji Okamoto |
3rd Author's Affiliation |
Tsukuba University (Tsukuba Univ.) |
4th Author's Name |
|
4th Author's Affiliation |
() |
5th Author's Name |
|
5th Author's Affiliation |
() |
6th Author's Name |
|
6th Author's Affiliation |
() |
7th Author's Name |
|
7th Author's Affiliation |
() |
8th Author's Name |
|
8th Author's Affiliation |
() |
9th Author's Name |
|
9th Author's Affiliation |
() |
10th Author's Name |
|
10th Author's Affiliation |
() |
11th Author's Name |
|
11th Author's Affiliation |
() |
12th Author's Name |
|
12th Author's Affiliation |
() |
13th Author's Name |
|
13th Author's Affiliation |
() |
14th Author's Name |
|
14th Author's Affiliation |
() |
15th Author's Name |
|
15th Author's Affiliation |
() |
16th Author's Name |
|
16th Author's Affiliation |
() |
17th Author's Name |
|
17th Author's Affiliation |
() |
18th Author's Name |
|
18th Author's Affiliation |
() |
19th Author's Name |
|
19th Author's Affiliation |
() |
20th Author's Name |
|
20th Author's Affiliation |
() |
Speaker |
Author-1 |
Date Time |
2010-05-21 15:20:00 |
Presentation Time |
25 minutes |
Registration for |
ISEC |
Paper # |
ISEC2010-6 |
Volume (vol) |
vol.110 |
Number (no) |
no.44 |
Page |
pp.33-39 |
#Pages |
7 |
Date of Issue |
2010-05-14 (ISEC) |