Key-policy attribute-based encryption against continual auxiliary input leakage
Attribute-based encryption mechanism can achieve very flexible access control, so it has a wide range of applications in the distributed environment, such as fine-grained access control, audit log applications, cloud storage systems. Key-policy attribute-based encryption (KP-ABE) scheme is especiall...
Saved in:
| Published in: | Information sciences Vol. 470; pp. 175 - 188 |
|---|---|
| Main Authors: | , , , |
| Format: | Journal Article |
| Language: | English |
| Published: |
Elsevier Inc
01.01.2019
|
| Subjects: | |
| ISSN: | 0020-0255, 1872-6291 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | Attribute-based encryption mechanism can achieve very flexible access control, so it has a wide range of applications in the distributed environment, such as fine-grained access control, audit log applications, cloud storage systems. Key-policy attribute-based encryption (KP-ABE) scheme is especially suitable for video on demand, pay TV, etc. Most of the existing KP-ABE schemes do not consider the side channel attacks which probably leak some secret information about the cryptosystems. In the paper, we present the formal definition and security model of key-policy attribute-based encryption scheme which is resilient to continual auxiliary input (CAI) leakage. What is more, we present a concrete KP-ABE scheme. The proposed scheme is proved secure under the static assumptions. |
|---|---|
| AbstractList | Attribute-based encryption mechanism can achieve very flexible access control, so it has a wide range of applications in the distributed environment, such as fine-grained access control, audit log applications, cloud storage systems. Key-policy attribute-based encryption (KP-ABE) scheme is especially suitable for video on demand, pay TV, etc. Most of the existing KP-ABE schemes do not consider the side channel attacks which probably leak some secret information about the cryptosystems. In the paper, we present the formal definition and security model of key-policy attribute-based encryption scheme which is resilient to continual auxiliary input (CAI) leakage. What is more, we present a concrete KP-ABE scheme. The proposed scheme is proved secure under the static assumptions. |
| Author | Shen, Jian Yu, Qihong Li, Jiguo Zhang, Yichen |
| Author_xml | – sequence: 1 givenname: Jiguo orcidid: 0000-0002-6532-2081 surname: Li fullname: Li, Jiguo email: ljg1688@163.com organization: College of Mathematics and Informatics, Fujian Normal University, Fuzhou 350117, China – sequence: 2 givenname: Qihong surname: Yu fullname: Yu, Qihong organization: School of Computer Science, Suqian College, Suqian 223800, China – sequence: 3 givenname: Yichen surname: Zhang fullname: Zhang, Yichen organization: College of Mathematics and Informatics, Fujian Normal University, Fuzhou 350117, China – sequence: 4 givenname: Jian surname: Shen fullname: Shen, Jian organization: School of Computer and Software, Nanjing University of Information Science and Technology, No. 219, Ningliu Road, Nanjing 210044, China |
| BookMark | eNp9kM1OwzAQhC1UJNrCA3DLCySs4zROxAlV_IlKvcDZ2jpOtSU4ke0g-vY4KicOlVa7h9U3mpkFm9neGsZuOWQceHl3yMj6LAdeZSDjyAs255XM0zKv-YzNAXJIIV-trtjC-wMAFLIs52z7Zo7p0HekjwmG4Gg3BpPu0JsmMVa74xCotwnuMeqHRPc2kB2xS3D8oY7QHROywxiSzuAn7s01u2yx8-bm7y7Zx9Pj-_ol3WyfX9cPm1SLUoQUuZCiaGpZ5dg0vF4JLDgvykobUWkUbYG8jqsBLUuBFUKrC5j-kTK7ViyZPOlq13vvTKs0BZy8BofUKQ5q6kUdVPStpl4UyDgykvwfOTj6ikHOMvcnxsRI32Sc8ppiPaYhZ3RQTU9n6F-w8H90 |
| CitedBy_id | crossref_primary_10_1109_ACCESS_2024_3381509 crossref_primary_10_1016_j_ins_2019_09_052 crossref_primary_10_3233_WEB_220015 crossref_primary_10_1109_ACCESS_2020_2991579 crossref_primary_10_1109_JSYST_2022_3208149 crossref_primary_10_1109_TIFS_2022_3196271 crossref_primary_10_1016_j_ins_2022_03_081 crossref_primary_10_1155_2019_5280806 crossref_primary_10_20965_jaciii_2023_p0855 crossref_primary_10_1093_comjnl_bxab205 crossref_primary_10_1109_ACCESS_2019_2919726 crossref_primary_10_1007_s11036_023_02102_0 crossref_primary_10_1109_TII_2021_3133345 crossref_primary_10_1016_j_ins_2020_05_092 crossref_primary_10_1109_ACCESS_2022_3210265 crossref_primary_10_1093_comjnl_bxab046 crossref_primary_10_1109_ACCESS_2019_2933542 crossref_primary_10_1016_j_eswa_2022_118545 crossref_primary_10_1108_IJPCC_02_2022_0047 crossref_primary_10_1109_ACCESS_2020_2980886 crossref_primary_10_1177_1550147719841276 crossref_primary_10_1109_ACCESS_2019_2909272 crossref_primary_10_1109_ACCESS_2020_3019774 crossref_primary_10_1155_2021_3573702 crossref_primary_10_1016_j_csi_2024_103854 crossref_primary_10_1155_2022_6849761 crossref_primary_10_1007_s42452_023_05386_9 crossref_primary_10_1155_2018_8738960 crossref_primary_10_3390_electronics13112175 crossref_primary_10_1109_TNSM_2022_3185237 crossref_primary_10_3390_sym15010179 crossref_primary_10_1109_ACCESS_2019_2922646 crossref_primary_10_1155_2020_2345369 crossref_primary_10_1016_j_ins_2019_01_051 crossref_primary_10_1007_s11227_021_03867_5 crossref_primary_10_1016_j_ins_2019_01_052 crossref_primary_10_1002_ett_4190 crossref_primary_10_1049_iet_its_2019_0833 crossref_primary_10_1093_comjnl_bxab017 crossref_primary_10_1007_s00500_019_04219_5 crossref_primary_10_1109_JSYST_2019_2944240 crossref_primary_10_1016_j_seta_2022_102556 crossref_primary_10_1109_ACCESS_2021_3136331 crossref_primary_10_1145_3408322 crossref_primary_10_1016_j_tcs_2018_11_019 crossref_primary_10_1109_JSYST_2020_2978146 crossref_primary_10_1109_ACCESS_2019_2925390 crossref_primary_10_1109_ACCESS_2020_2976746 crossref_primary_10_1093_comjnl_bxaa082 crossref_primary_10_1109_ACCESS_2020_2975813 crossref_primary_10_1109_ACCESS_2020_2995480 crossref_primary_10_1109_TC_2020_3043950 crossref_primary_10_1109_TCC_2019_2929045 crossref_primary_10_3390_s20041088 crossref_primary_10_1109_TBC_2020_2984974 crossref_primary_10_1109_TCC_2020_2975184 crossref_primary_10_1007_s00500_019_04018_y crossref_primary_10_1109_TAES_2022_3197684 crossref_primary_10_1155_2020_1492681 crossref_primary_10_1109_ACCESS_2020_2969223 crossref_primary_10_1109_TITS_2023_3329488 crossref_primary_10_1145_3442150 crossref_primary_10_1109_TIFS_2024_3419716 crossref_primary_10_1016_j_jisa_2020_102521 crossref_primary_10_1109_TIFS_2022_3173412 crossref_primary_10_1109_ACCESS_2020_2991431 crossref_primary_10_3390_electronics10212685 crossref_primary_10_1016_j_ins_2020_10_058 crossref_primary_10_1109_TDSC_2020_2977646 crossref_primary_10_1109_TKDE_2023_3241198 crossref_primary_10_1109_TSC_2019_2937764 crossref_primary_10_1109_JSYST_2019_2918022 crossref_primary_10_1155_2022_8220259 crossref_primary_10_1093_comjnl_bxy144 crossref_primary_10_3390_electronics13244909 crossref_primary_10_1007_s10623_023_01268_8 crossref_primary_10_1109_TSC_2021_3096420 crossref_primary_10_1109_ACCESS_2020_2969957 crossref_primary_10_1109_JIOT_2024_3468018 crossref_primary_10_1016_j_csi_2020_103471 crossref_primary_10_1109_TETC_2019_2904637 crossref_primary_10_1109_TIFS_2020_2973864 crossref_primary_10_1109_ACCESS_2019_2931531 crossref_primary_10_1109_JIOT_2020_2986303 crossref_primary_10_1155_2022_8350006 crossref_primary_10_1016_j_ins_2019_03_053 crossref_primary_10_3390_s21206821 crossref_primary_10_1016_j_sysarc_2023_102982 crossref_primary_10_1007_s10586_024_04546_9 crossref_primary_10_1007_s11704_019_9189_7 crossref_primary_10_1093_comjnl_bxz085 crossref_primary_10_1155_2019_8093578 crossref_primary_10_1016_j_ins_2021_08_053 crossref_primary_10_1109_JIOT_2021_3104585 crossref_primary_10_1155_2021_5595243 |
| Cites_doi | 10.1002/dac.2942 10.1109/TSC.2016.2542813 10.1155/2017/3596205 10.1109/TIFS.2015.2405905 10.1002/sec.1396 10.1137/100813464 10.1145/1506409.1506429 10.1109/TIFS.2016.2601070 10.1016/j.ins.2018.04.067 10.1109/JSYST.2017.2667679 10.1109/TIFS.2013.2271848 10.1109/TIFS.2012.2223683 10.1093/comjnl/bxv128 10.1109/TDSC.2016.2608343 10.1109/TSC.2016.2520932 10.1016/j.jss.2015.05.066 10.1016/j.ins.2017.11.008 10.1049/iet-ifs.2013.0173 10.1007/s00145-015-9200-x 10.1109/TSC.2017.2710190 10.1002/sec.1659 10.1016/j.tcs.2017.10.020 10.1007/s10207-014-0270-9 |
| ContentType | Journal Article |
| Copyright | 2018 Elsevier Inc. |
| Copyright_xml | – notice: 2018 Elsevier Inc. |
| DBID | AAYXX CITATION |
| DOI | 10.1016/j.ins.2018.07.077 |
| DatabaseName | CrossRef |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering Library & Information Science |
| EISSN | 1872-6291 |
| EndPage | 188 |
| ExternalDocumentID | 10_1016_j_ins_2018_07_077 S0020025516308374 |
| GroupedDBID | --K --M --Z -~X .DC .~1 0R~ 1B1 1OL 1RT 1~. 1~5 29I 4.4 457 4G. 5GY 5VS 7-5 71M 8P~ 9JN 9JO AAAKF AAAKG AABNK AACTN AAEDT AAEDW AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AAQXK AARIN AAXUO AAYFN ABAOU ABBOA ABEFU ABFNM ABJNI ABMAC ABTAH ABUCO ABXDB ABYKQ ACAZW ACDAQ ACGFS ACNNM ACRLP ACZNC ADBBV ADEZE ADGUI ADJOM ADMUD ADTZH AEBSH AECPX AEKER AENEX AFFNX AFKWA AFTJW AGHFR AGUBO AGYEJ AHHHB AHJVU AHZHX AIALX AIEXJ AIGVJ AIKHN AITUG AJBFU AJOXV ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AOUOD APLSM ARUGR ASPBG AVWKF AXJTR AZFZN BJAXD BKOJK BLXMC CS3 DU5 EBS EFJIC EFLBG EJD EO8 EO9 EP2 EP3 F5P FDB FEDTE FGOYB FIRID FNPLU FYGXN G-Q GBLVA GBOLZ HAMUX HLZ HVGLF HZ~ H~9 IHE J1W JJJVA KOM LG9 LY1 M41 MHUIS MO0 MS~ N9A O-L O9- OAUVE OZT P-8 P-9 P2P PC. Q38 R2- RIG ROL RPZ SBC SDF SDG SDP SDS SES SEW SPC SPCBC SSB SSD SST SSV SSW SSZ T5K TN5 TWZ UHS WH7 WUQ XPP YYP ZMT ZY4 ~02 ~G- 77I 9DU AATTM AAXKI AAYWO AAYXX ABWVN ACLOT ACRPL ACVFH ADCNI ADNMO ADVLN AEIPS AEUPX AFJKZ AFPUW AGQPQ AIGII AIIUN AKBMS AKRWK AKYEP ANKPU APXCP CITATION EFKBS ~HD |
| ID | FETCH-LOGICAL-c363t-a13734d9782add1953a411468ce38ca3f4a19f4ad0c763a8a0fc40468c34debf3 |
| ISICitedReferencesCount | 106 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000447482100012&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 0020-0255 |
| IngestDate | Sat Nov 29 06:25:07 EST 2025 Tue Nov 18 22:19:51 EST 2025 Fri Feb 23 02:33:54 EST 2024 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Keywords | Dual system encryption Continual auxiliary input leakage Static assumptions Key-policy attribute-based encryption |
| Language | English |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-c363t-a13734d9782add1953a411468ce38ca3f4a19f4ad0c763a8a0fc40468c34debf3 |
| ORCID | 0000-0002-6532-2081 |
| PageCount | 14 |
| ParticipantIDs | crossref_citationtrail_10_1016_j_ins_2018_07_077 crossref_primary_10_1016_j_ins_2018_07_077 elsevier_sciencedirect_doi_10_1016_j_ins_2018_07_077 |
| PublicationCentury | 2000 |
| PublicationDate | January 2019 2019-01-00 |
| PublicationDateYYYYMMDD | 2019-01-01 |
| PublicationDate_xml | – month: 01 year: 2019 text: January 2019 |
| PublicationDecade | 2010 |
| PublicationTitle | Information sciences |
| PublicationYear | 2019 |
| Publisher | Elsevier Inc |
| Publisher_xml | – name: Elsevier Inc |
| References | Micali, Reyzin (bib0037) 2004; 2951 Sahai, Waters (bib0044) 2005; 3494 Li, Guo, Yu, Lu, Zhang (bib0022) 2016; 9 Qin, Liu, Chen (bib0043) 2013; 9 Li, Shi, Zhang (bib0026) 2017; 30 Goyal, Pandey, Sahai, Waters (bib0009) 2006 Li, Yan, Zhang (bib0030) 2017 Waters (bib0046) 2009; 5677 Yan, Li, Han, Zhang (bib0047) 2017; 12 Lewko, Waters (bib0020) 2010; 5978 Naor, Segev (bib0038) 2012; 41 Lewko, Okamoto, Sahai, Takashima, Waters (bib0016) 2010; 6110 Ning, Dong, Cao, Wei, Lin (bib0039) 2015; 10 Lai, Deng, Guan, Weng (bib0014) 2013; 8 Halderman, Schoen, Heninger, Clarkson, Paul, Calandrino, Feldman, Appelbaum, Felten (bib0012) 2009; 52 . Dodis, Goldwasser, Kalai, Peikert, Vaikuntanathan (bib0006) 2010; 5978 Li, Wang, Zhang, Han (bib0028) 2017 Brakerski, Kalai, Katz, Vaikuntanathan (bib0003) 2010 Dziembowski, Pietrzak (bib0008) 2008 Li, Yu, Zhang (bib0034) 2018 J. Ning, Z. Cao, X. Dong, L. Wei, White-box traceable CP-ABE for cloud storage service: how to catch people leaking their access credentials effectively. IEEE Trans. Dependable Secure Comput. (2016) DOI Lewko, Rouselakis, Waters (bib0017) 2011; 6597 Li, Chen, Lu, Zhang (bib0021) 2018; 454-455 Boneh, Goh, Nissim (bib0002) 2005; 3378 Liu, Weng, Zhao (bib0035) 2013; 7779 Waters (bib0045) 2011; 6571 Li, Yu, Zhang (bib0033) 2018; 429 Lewko, Sahai, Waters (bib0018) 2010 Li, Wang, Zhang, Shen (bib0029) 2016; 10 Cheung, Newport (bib0005) 2007 Lewko, Waters (bib0019) 2011; 6632 Guo, Li, Lu, Zhang, Zhang (bib0010) 2018; 711 Chase (bib0004) 2007; 4392 Yu, Li, Zhang, Wu, Huang, Xiang (bib0048) 2016; 116 Guo, Li, Zhang, Shen (bib0011) 2016; 9 Zhang, Chen, Li, Li (bib0050) 2013 Dodis, Haralambiev, Lopez-Alt, Wichs (bib0007) 2010 Li, Yao, Han, Zhang, Shen (bib0031) 2018; 12 Li, Sha, Zhang, Huang, Shen (bib0025) 2017; 2017 Li, Teng, Zhang, Yu (bib0027) 2016; 59 Lai, Deng, Li, Wang (bib0015) 2014 Li, Lin, Zhang, Han (bib0024) 2017; 10 Li, Guo, Yu, Lu, Zhang, Zhang (bib0023) 2016; 355–356 Akavia, Goldwasser, Vaikuntanathan (bib0001) 2009; 5444 Hazay, López-Alt, Wee, Wichs (bib0013) 2016; 29 Liu, Cao, Wong (bib0036) 2013; 8 Yuen, Chow, Zhang, Yiu (bib0049) 2012; 7237 Li, Yao, Zhang, Qian, Han (bib0032) 2017; 10 Ostrovsky, Sahai, Waters (bib0041) 2007 Qian, Li, Zhang, Han (bib0042) 2015; 14 Qin (10.1016/j.ins.2018.07.077_bib0043) 2013; 9 Naor (10.1016/j.ins.2018.07.077_bib0038) 2012; 41 10.1016/j.ins.2018.07.077_bib0040 Hazay (10.1016/j.ins.2018.07.077_bib0013) 2016; 29 Ostrovsky (10.1016/j.ins.2018.07.077_bib0041) 2007 Li (10.1016/j.ins.2018.07.077_bib0025) 2017; 2017 Lewko (10.1016/j.ins.2018.07.077_bib0016) 2010; 6110 Sahai (10.1016/j.ins.2018.07.077_bib0044) 2005; 3494 Li (10.1016/j.ins.2018.07.077_bib0029) 2016; 10 Lewko (10.1016/j.ins.2018.07.077_bib0017) 2011; 6597 Li (10.1016/j.ins.2018.07.077_bib0028) 2017 Liu (10.1016/j.ins.2018.07.077_bib0035) 2013; 7779 Ning (10.1016/j.ins.2018.07.077_bib0039) 2015; 10 Zhang (10.1016/j.ins.2018.07.077_bib0050) 2013 Lewko (10.1016/j.ins.2018.07.077_bib0019) 2011; 6632 Liu (10.1016/j.ins.2018.07.077_bib0036) 2013; 8 Lai (10.1016/j.ins.2018.07.077_bib0015) 2014 Micali (10.1016/j.ins.2018.07.077_bib0037) 2004; 2951 Akavia (10.1016/j.ins.2018.07.077_bib0001) 2009; 5444 Li (10.1016/j.ins.2018.07.077_bib0031) 2018; 12 Waters (10.1016/j.ins.2018.07.077_bib0046) 2009; 5677 Li (10.1016/j.ins.2018.07.077_bib0032) 2017; 10 Li (10.1016/j.ins.2018.07.077_bib0021) 2018; 454-455 Dziembowski (10.1016/j.ins.2018.07.077_bib0008) 2008 Li (10.1016/j.ins.2018.07.077_bib0023) 2016; 355–356 Lewko (10.1016/j.ins.2018.07.077_bib0020) 2010; 5978 Dodis (10.1016/j.ins.2018.07.077_bib0006) 2010; 5978 Lai (10.1016/j.ins.2018.07.077_bib0014) 2013; 8 Yu (10.1016/j.ins.2018.07.077_bib0048) 2016; 116 Li (10.1016/j.ins.2018.07.077_bib0033) 2018; 429 Halderman (10.1016/j.ins.2018.07.077_bib0012) 2009; 52 Dodis (10.1016/j.ins.2018.07.077_bib0007) 2010 Yan (10.1016/j.ins.2018.07.077_bib0047) 2017; 12 Guo (10.1016/j.ins.2018.07.077_bib0011) 2016; 9 Goyal (10.1016/j.ins.2018.07.077_bib0009) 2006 Chase (10.1016/j.ins.2018.07.077_bib0004) 2007; 4392 Yuen (10.1016/j.ins.2018.07.077_bib0049) 2012; 7237 Waters (10.1016/j.ins.2018.07.077_bib0045) 2011; 6571 Li (10.1016/j.ins.2018.07.077_bib0022) 2016; 9 Boneh (10.1016/j.ins.2018.07.077_bib0002) 2005; 3378 Brakerski (10.1016/j.ins.2018.07.077_bib0003) 2010 Li (10.1016/j.ins.2018.07.077_bib0027) 2016; 59 Li (10.1016/j.ins.2018.07.077_bib0030) 2017 Guo (10.1016/j.ins.2018.07.077_bib0010) 2018; 711 Li (10.1016/j.ins.2018.07.077_bib0024) 2017; 10 Qian (10.1016/j.ins.2018.07.077_bib0042) 2015; 14 Lewko (10.1016/j.ins.2018.07.077_bib0018) 2010 Li (10.1016/j.ins.2018.07.077_bib0026) 2017; 30 Li (10.1016/j.ins.2018.07.077_bib0034) 2018 Cheung (10.1016/j.ins.2018.07.077_bib0005) 2007 |
| References_xml | – volume: 14 start-page: 487 year: 2015 end-page: 497 ident: bib0042 article-title: Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation publication-title: Int. J. Inf. Secur. – volume: 7237 start-page: 117 year: 2012 end-page: 134 ident: bib0049 article-title: Identity-based encryption resilient to continual auxiliary leakage publication-title: EUROCRYPT 2012 – volume: 2017 year: 2017 ident: bib0025 article-title: Verifiable outsourced decryption of attribute-based encryption with constant ciphertext length publication-title: Secur. Commun. Netw. – start-page: 239 year: 2014 end-page: 248 ident: bib0015 article-title: Fully secure key-policy attribute-based encryption with constant-size ciphertexts and fast decryption publication-title: ASIACCS – volume: 6110 start-page: 62 year: 2010 end-page: 91 ident: bib0016 article-title: Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption publication-title: EUROCRYPT – volume: 6571 start-page: 53 year: 2011 end-page: 70 ident: bib0045 article-title: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization publication-title: PKC 2011 – volume: 116 start-page: 101 year: 2016 end-page: 112 ident: bib0048 article-title: Certificate-based encryption resilient to key leakage publication-title: J. Syst. Software – volume: 10 start-page: 715 year: 2017 end-page: 725 ident: bib0024 article-title: KSF-OABE: outsourced attribute-based encryption with keyword search function for cloud storage publication-title: IEEE Trans. Serv. Comput. – volume: 9 start-page: 1016 year: 2016 end-page: 1024 ident: bib0022 article-title: Provably secure identity-based encryption resilient to post-challenge continuous auxiliary inputs leakage publication-title: Secur. Commun. Netw. – volume: 59 start-page: 1066 year: 2016 end-page: 1075 ident: bib0027 article-title: A leakage-resilient CCA-secure identity-based encryption scheme publication-title: Comp. J. – year: 2017 ident: bib0028 article-title: Full verifiability for outsourced decryption in attribute based encryption publication-title: IEEE Trans. Serv. Comput. – volume: 8 start-page: 76 year: 2013 end-page: 88 ident: bib0036 article-title: White-box traceable ciphertext-policy attribute-based encryption supporting any monotone access structures publication-title: IEEE Trans. Inf. Forensics Secur. – volume: 10 start-page: 1274 year: 2015 end-page: 1288 ident: bib0039 article-title: White-box traceable ciphertext-policy attribute-based encryption supporting flexible attributes publication-title: IEEE Trans. Inf. Forensics Secur. – volume: 5978 start-page: 361 year: 2010 end-page: 381 ident: bib0006 article-title: Public-key encryption schemes with auxiliary inputs publication-title: TCC 2010 – volume: 12 start-page: 1767 year: 2018 end-page: 1777 ident: bib0031 article-title: User collusion avoidance CP-ABE with efficient attribute revocation for cloud storage publication-title: IEEE Syst. J. – volume: 3494 start-page: 457 year: 2005 end-page: 473 ident: bib0044 article-title: Fuzzy identity-based encryption publication-title: EUROCRYPT 2005 – volume: 30 year: 2017 ident: bib0026 article-title: Searchable ciphertext-policy attribute-based encryption with revocation in cloud storage publication-title: Int. J. Commun. Syst. – reference: J. Ning, Z. Cao, X. Dong, L. Wei, White-box traceable CP-ABE for cloud storage service: how to catch people leaking their access credentials effectively. IEEE Trans. Dependable Secure Comput. (2016) DOI: – volume: 9 start-page: 32 year: 2013 end-page: 42 ident: bib0043 article-title: Efficient chosen-ciphertext secure public-key encryption scheme with high leakage-resilience publication-title: IET Inf. Secur. – volume: 711 start-page: 1 year: 2018 end-page: 10 ident: bib0010 article-title: Provably secure certificate-based encryption with leakage resilience publication-title: Theor. Comp. Sci. – start-page: 273 year: 2010 end-page: 285 ident: bib0018 article-title: Revocation systems with very small private keys publication-title: SP 2010, IEEE Computer Society – volume: 3378 start-page: 325 year: 2005 end-page: 341 ident: bib0002 article-title: Evaluating 2-dnf formulas on ciphertexts publication-title: TCC 2005 – volume: 6632 start-page: 547 year: 2011 end-page: 567 ident: bib0019 article-title: Unbounded HIBE and attribute-based encryption publication-title: EUROCRYPT – volume: 41 start-page: 772 year: 2012 end-page: 814 ident: bib0038 article-title: Public-key cryptosystems resilient to key leakage publication-title: SIAM J. Comput. – volume: 29 start-page: 514 year: 2016 end-page: 551 ident: bib0013 article-title: Leakage-resilient cryptography from minimal assumptions publication-title: J. Cryptol. – start-page: 501 year: 2010 end-page: 510 ident: bib0003 article-title: Overcoming the hole in the bucket: public-key cryptography resilient to continual memory leakage publication-title: FOCS 2010, IEEE Computer Society – start-page: 456 year: 2007 end-page: 465 ident: bib0005 article-title: Provably secure ciphertext policy ABE publication-title: CCS 2007 – volume: 355–356 start-page: 1 year: 2016 end-page: 14 ident: bib0023 article-title: Continuous leakage-resilient certificate-based encryption publication-title: Inf. Sci. – volume: 5677 start-page: 619 year: 2009 end-page: 636 ident: bib0046 article-title: Dual system encryption: realizing fully secure IBE and HIBE under simple assumptions publication-title: CRYPTO 2009 – year: 2018 ident: bib0034 article-title: Hierarchical attribute based encryption with continuous leakage-resilience publication-title: Inf. Sci. – volume: 429 start-page: 177 year: 2018 end-page: 193 ident: bib0033 article-title: Identity-based broadcast encryption with continuous leakage resilience publication-title: Inf. Sci. – year: 2017 ident: bib0030 article-title: Certificateless public integrity checking of group shared data on cloud storage publication-title: IEEE Trans. Serv. Comput. – volume: 6597 start-page: 70 year: 2011 end-page: 88 ident: bib0017 article-title: Achieving leakage resilience through dual system encryption publication-title: TCC – volume: 10 start-page: 3339 year: 2016 end-page: 3352 ident: bib0029 article-title: Ciphertext-policy attribute-based encryption with hidden access policy and testing publication-title: KSII Trans. Internet Inf. Syst. – volume: 4392 start-page: 515 year: 2007 end-page: 534 ident: bib0004 article-title: Multi-authority attribute based encryption publication-title: TCC 2007 – volume: 2951 start-page: 278 year: 2004 end-page: 296 ident: bib0037 article-title: Physically observable cryptography publication-title: TCC – start-page: 89 year: 2006 end-page: 98 ident: bib0009 article-title: Attribute-based encryption for fine-grained access control of encrypted data publication-title: CCS – start-page: 511 year: 2013 end-page: 516 ident: bib0050 article-title: Anonymous attribute-based encryption supporting efficient decryption test publication-title: ASIACCS 2013 – volume: 9 start-page: 4852 year: 2016 end-page: 4862 ident: bib0011 article-title: Hierarchical attribute-based encryption with continuous auxiliary inputs leakage publication-title: Secur. Commun. Netw. – volume: 7779 start-page: 84 year: 2013 end-page: 100 ident: bib0035 article-title: Efficient public key cryptosystem resilient to key leakage chosen ciphertext attacks publication-title: CT-RSA – volume: 5444 start-page: 474 year: 2009 end-page: 495 ident: bib0001 article-title: Simultaneous hardcore bits and cryptography against memory attacks publication-title: TCC 2009 – start-page: 293 year: 2008 end-page: 302 ident: bib0008 article-title: Leakage-resilient cryptography publication-title: FOCS 2008, IEEE Computer Society – reference: . – start-page: 511 year: 2010 end-page: 520 ident: bib0007 article-title: Cryptography against continuous memory attacks publication-title: FOCS – volume: 10 start-page: 785 year: 2017 end-page: 796 ident: bib0032 article-title: Flexible and fine-grained attribute-based data storage in cloud computing publication-title: IEEE Trans. Serv. Comput. – volume: 52 start-page: 91 year: 2009 end-page: 98 ident: bib0012 article-title: Lest we remember: cold-boot attacks on encryption keys publication-title: Commun. ACM – volume: 5978 start-page: 455 year: 2010 end-page: 479 ident: bib0020 article-title: New techniques for dual system encryption and fully secure hibe with short ciphertexts publication-title: TCC – volume: 12 start-page: 78 year: 2017 end-page: 88 ident: bib0047 article-title: A novel efficient remote data possession checking protocol in cloud storage publication-title: IEEE Trans. Inf. Forensics Secur. – volume: 454-455 start-page: 110 year: 2018 end-page: 127 ident: bib0021 article-title: Anonymous certificate-based broadcast encryption with constant decryption cost publication-title: Inf. Sci. – volume: 8 start-page: 1343 year: 2013 end-page: 1354 ident: bib0014 article-title: Attribute-based encryption with verifiable outsourced decryption publication-title: IEEE Trans. Inf. Forensics Secur. – start-page: 195 year: 2007 end-page: 203 ident: bib0041 article-title: Attribute-based encryption with non-monotonic access structures publication-title: CCS 2007 – volume: 5978 start-page: 361 year: 2010 ident: 10.1016/j.ins.2018.07.077_bib0006 article-title: Public-key encryption schemes with auxiliary inputs – volume: 7237 start-page: 117 year: 2012 ident: 10.1016/j.ins.2018.07.077_bib0049 article-title: Identity-based encryption resilient to continual auxiliary leakage – volume: 6597 start-page: 70 year: 2011 ident: 10.1016/j.ins.2018.07.077_bib0017 article-title: Achieving leakage resilience through dual system encryption – volume: 30 issue: 1 year: 2017 ident: 10.1016/j.ins.2018.07.077_bib0026 article-title: Searchable ciphertext-policy attribute-based encryption with revocation in cloud storage publication-title: Int. J. Commun. Syst. doi: 10.1002/dac.2942 – volume: 10 start-page: 715 issue: 5 year: 2017 ident: 10.1016/j.ins.2018.07.077_bib0024 article-title: KSF-OABE: outsourced attribute-based encryption with keyword search function for cloud storage publication-title: IEEE Trans. Serv. Comput. doi: 10.1109/TSC.2016.2542813 – volume: 10 start-page: 3339 issue: 7 year: 2016 ident: 10.1016/j.ins.2018.07.077_bib0029 article-title: Ciphertext-policy attribute-based encryption with hidden access policy and testing publication-title: KSII Trans. Internet Inf. Syst. – volume: 2017 year: 2017 ident: 10.1016/j.ins.2018.07.077_bib0025 article-title: Verifiable outsourced decryption of attribute-based encryption with constant ciphertext length publication-title: Secur. Commun. Netw. doi: 10.1155/2017/3596205 – volume: 3494 start-page: 457 year: 2005 ident: 10.1016/j.ins.2018.07.077_bib0044 article-title: Fuzzy identity-based encryption – year: 2017 ident: 10.1016/j.ins.2018.07.077_bib0030 article-title: Certificateless public integrity checking of group shared data on cloud storage publication-title: IEEE Trans. Serv. Comput. – volume: 10 start-page: 1274 issue: 6 year: 2015 ident: 10.1016/j.ins.2018.07.077_bib0039 article-title: White-box traceable ciphertext-policy attribute-based encryption supporting flexible attributes publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2015.2405905 – volume: 9 start-page: 1016 issue: 10 year: 2016 ident: 10.1016/j.ins.2018.07.077_bib0022 article-title: Provably secure identity-based encryption resilient to post-challenge continuous auxiliary inputs leakage publication-title: Secur. Commun. Netw. doi: 10.1002/sec.1396 – volume: 41 start-page: 772 issue: 4 year: 2012 ident: 10.1016/j.ins.2018.07.077_bib0038 article-title: Public-key cryptosystems resilient to key leakage publication-title: SIAM J. Comput. doi: 10.1137/100813464 – volume: 6632 start-page: 547 year: 2011 ident: 10.1016/j.ins.2018.07.077_bib0019 article-title: Unbounded HIBE and attribute-based encryption – volume: 52 start-page: 91 issue: 5 year: 2009 ident: 10.1016/j.ins.2018.07.077_bib0012 article-title: Lest we remember: cold-boot attacks on encryption keys publication-title: Commun. ACM doi: 10.1145/1506409.1506429 – volume: 5677 start-page: 619 year: 2009 ident: 10.1016/j.ins.2018.07.077_bib0046 article-title: Dual system encryption: realizing fully secure IBE and HIBE under simple assumptions – volume: 6571 start-page: 53 year: 2011 ident: 10.1016/j.ins.2018.07.077_bib0045 article-title: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization – start-page: 273 year: 2010 ident: 10.1016/j.ins.2018.07.077_bib0018 article-title: Revocation systems with very small private keys – volume: 7779 start-page: 84 year: 2013 ident: 10.1016/j.ins.2018.07.077_bib0035 article-title: Efficient public key cryptosystem resilient to key leakage chosen ciphertext attacks – start-page: 195 year: 2007 ident: 10.1016/j.ins.2018.07.077_bib0041 article-title: Attribute-based encryption with non-monotonic access structures – start-page: 239 year: 2014 ident: 10.1016/j.ins.2018.07.077_bib0015 article-title: Fully secure key-policy attribute-based encryption with constant-size ciphertexts and fast decryption – start-page: 293 year: 2008 ident: 10.1016/j.ins.2018.07.077_bib0008 article-title: Leakage-resilient cryptography – volume: 5978 start-page: 455 year: 2010 ident: 10.1016/j.ins.2018.07.077_bib0020 article-title: New techniques for dual system encryption and fully secure hibe with short ciphertexts – volume: 2951 start-page: 278 year: 2004 ident: 10.1016/j.ins.2018.07.077_bib0037 article-title: Physically observable cryptography – volume: 12 start-page: 78 issue: 1 year: 2017 ident: 10.1016/j.ins.2018.07.077_bib0047 article-title: A novel efficient remote data possession checking protocol in cloud storage publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2016.2601070 – volume: 454-455 start-page: 110 year: 2018 ident: 10.1016/j.ins.2018.07.077_bib0021 article-title: Anonymous certificate-based broadcast encryption with constant decryption cost publication-title: Inf. Sci. doi: 10.1016/j.ins.2018.04.067 – volume: 355–356 start-page: 1 year: 2016 ident: 10.1016/j.ins.2018.07.077_bib0023 article-title: Continuous leakage-resilient certificate-based encryption publication-title: Inf. Sci. – year: 2018 ident: 10.1016/j.ins.2018.07.077_bib0034 article-title: Hierarchical attribute based encryption with continuous leakage-resilience publication-title: Inf. Sci. – volume: 12 start-page: 1767 issue: 2 year: 2018 ident: 10.1016/j.ins.2018.07.077_bib0031 article-title: User collusion avoidance CP-ABE with efficient attribute revocation for cloud storage publication-title: IEEE Syst. J. doi: 10.1109/JSYST.2017.2667679 – volume: 8 start-page: 1343 issue: 8 year: 2013 ident: 10.1016/j.ins.2018.07.077_bib0014 article-title: Attribute-based encryption with verifiable outsourced decryption publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2013.2271848 – volume: 8 start-page: 76 issue: 1 year: 2013 ident: 10.1016/j.ins.2018.07.077_bib0036 article-title: White-box traceable ciphertext-policy attribute-based encryption supporting any monotone access structures publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2012.2223683 – volume: 59 start-page: 1066 issue: 7 year: 2016 ident: 10.1016/j.ins.2018.07.077_bib0027 article-title: A leakage-resilient CCA-secure identity-based encryption scheme publication-title: Comp. J. doi: 10.1093/comjnl/bxv128 – ident: 10.1016/j.ins.2018.07.077_bib0040 doi: 10.1109/TDSC.2016.2608343 – volume: 5444 start-page: 474 year: 2009 ident: 10.1016/j.ins.2018.07.077_bib0001 article-title: Simultaneous hardcore bits and cryptography against memory attacks – volume: 10 start-page: 785 issue: 5 year: 2017 ident: 10.1016/j.ins.2018.07.077_bib0032 article-title: Flexible and fine-grained attribute-based data storage in cloud computing publication-title: IEEE Trans. Serv. Comput. doi: 10.1109/TSC.2016.2520932 – volume: 6110 start-page: 62 year: 2010 ident: 10.1016/j.ins.2018.07.077_bib0016 article-title: Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption – volume: 116 start-page: 101 year: 2016 ident: 10.1016/j.ins.2018.07.077_bib0048 article-title: Certificate-based encryption resilient to key leakage publication-title: J. Syst. Software doi: 10.1016/j.jss.2015.05.066 – start-page: 89 year: 2006 ident: 10.1016/j.ins.2018.07.077_bib0009 article-title: Attribute-based encryption for fine-grained access control of encrypted data – volume: 429 start-page: 177 issue: 3 year: 2018 ident: 10.1016/j.ins.2018.07.077_bib0033 article-title: Identity-based broadcast encryption with continuous leakage resilience publication-title: Inf. Sci. doi: 10.1016/j.ins.2017.11.008 – volume: 9 start-page: 32 issue: 1 year: 2013 ident: 10.1016/j.ins.2018.07.077_bib0043 article-title: Efficient chosen-ciphertext secure public-key encryption scheme with high leakage-resilience publication-title: IET Inf. Secur. doi: 10.1049/iet-ifs.2013.0173 – start-page: 501 year: 2010 ident: 10.1016/j.ins.2018.07.077_bib0003 article-title: Overcoming the hole in the bucket: public-key cryptography resilient to continual memory leakage – start-page: 456 year: 2007 ident: 10.1016/j.ins.2018.07.077_bib0005 article-title: Provably secure ciphertext policy ABE – volume: 3378 start-page: 325 year: 2005 ident: 10.1016/j.ins.2018.07.077_bib0002 article-title: Evaluating 2-dnf formulas on ciphertexts – volume: 4392 start-page: 515 year: 2007 ident: 10.1016/j.ins.2018.07.077_bib0004 article-title: Multi-authority attribute based encryption – volume: 29 start-page: 514 issue: 3 year: 2016 ident: 10.1016/j.ins.2018.07.077_bib0013 article-title: Leakage-resilient cryptography from minimal assumptions publication-title: J. Cryptol. doi: 10.1007/s00145-015-9200-x – year: 2017 ident: 10.1016/j.ins.2018.07.077_bib0028 article-title: Full verifiability for outsourced decryption in attribute based encryption publication-title: IEEE Trans. Serv. Comput. doi: 10.1109/TSC.2017.2710190 – start-page: 511 year: 2013 ident: 10.1016/j.ins.2018.07.077_bib0050 article-title: Anonymous attribute-based encryption supporting efficient decryption test – volume: 9 start-page: 4852 issue: 18 year: 2016 ident: 10.1016/j.ins.2018.07.077_bib0011 article-title: Hierarchical attribute-based encryption with continuous auxiliary inputs leakage publication-title: Secur. Commun. Netw. doi: 10.1002/sec.1659 – volume: 711 start-page: 1 year: 2018 ident: 10.1016/j.ins.2018.07.077_bib0010 article-title: Provably secure certificate-based encryption with leakage resilience publication-title: Theor. Comp. Sci. doi: 10.1016/j.tcs.2017.10.020 – start-page: 511 year: 2010 ident: 10.1016/j.ins.2018.07.077_bib0007 article-title: Cryptography against continuous memory attacks – volume: 14 start-page: 487 issue: 6 year: 2015 ident: 10.1016/j.ins.2018.07.077_bib0042 article-title: Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation publication-title: Int. J. Inf. Secur. doi: 10.1007/s10207-014-0270-9 |
| SSID | ssj0004766 |
| Score | 2.564046 |
| Snippet | Attribute-based encryption mechanism can achieve very flexible access control, so it has a wide range of applications in the distributed environment, such as... |
| SourceID | crossref elsevier |
| SourceType | Enrichment Source Index Database Publisher |
| StartPage | 175 |
| SubjectTerms | Continual auxiliary input leakage Dual system encryption Key-policy attribute-based encryption Static assumptions |
| Title | Key-policy attribute-based encryption against continual auxiliary input leakage |
| URI | https://dx.doi.org/10.1016/j.ins.2018.07.077 |
| Volume | 470 |
| WOSCitedRecordID | wos000447482100012&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVESC databaseName: Elsevier SD Freedom Collection Journals 2021 customDbUrl: eissn: 1872-6291 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0004766 issn: 0020-0255 databaseCode: AIEXJ dateStart: 19950101 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3db9MwELfKxgN7QDBAbLDJD4gHJktJ7db244SG2EADxJDKU-Q47shWpVGXTN1_z_krTceHAAmpsionTtPcL3dn--5-CL3QKsl5wQpilE3JMYJZmpeUjJkygBk-4rknm-Cnp2IykR8HgzrmwlzPeFWJ5VLW_1XU0AfCtqmzfyHu7qLQAd9B6NCC2KH9I8G_MzekdtV-D1Tj-awMscaqOIDbXNx4HaHOVQmeoQtVL12JfdUuy1lpg-jKqm4byydxqdYjhULukrtAMJ2dS_7ehQWclOftvNMkre36VH6bB_PYX6D-amNQO2R-jkkiEa1hIcLmPq0tRHQZMmsBnNYdJXbe4u2NV7KCD8l46Fm6ohZmnj8k6NGUj3omOfXMfz9oe7_wcAFTFFt4PRWuDGtghVkvom33pN30CdxPcDo5u4M2h3wkQQ9uHh4fTU5WubTc72_H-4474S4m8NYP_dyX6fknZw_Q_TCxwIceEA_RwFTbaKtXbnIb7YUkFfwS9ySJg3p_hD6soINvQQevoIMDdHAHHdxBBzvo4ACdx-jLm6Oz129JINwgmo5pQ1RKOWWFBK8RzJ7dYFXMZq0LbajQik6ZSiU0RaLBLCmhkqlmiT0Oo0w-pU_QRjWvzFOEuZQ6Bz9AipQypmguaKJGRoqpKfLhWOygJD66TIdq9JYUZZbFsMOLDP5LZp92lnD48B30qhtS-1IsvzuZRXlk4YXwPmIG4Pn1sN1_G_YM3Vu9Ec_RRrNozR66q6-b8mqxHyD2Ha5_mdI |
| linkProvider | Elsevier |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Key-policy+attribute-based+encryption+against+continual+auxiliary+input+leakage&rft.jtitle=Information+sciences&rft.au=Li%2C+Jiguo&rft.au=Yu%2C+Qihong&rft.au=Zhang%2C+Yichen&rft.au=Shen%2C+Jian&rft.date=2019-01-01&rft.pub=Elsevier+Inc&rft.issn=0020-0255&rft.eissn=1872-6291&rft.volume=470&rft.spage=175&rft.epage=188&rft_id=info:doi/10.1016%2Fj.ins.2018.07.077&rft.externalDocID=S0020025516308374 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0020-0255&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0020-0255&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0020-0255&client=summon |