Key-policy attribute-based encryption against continual auxiliary input leakage

Attribute-based encryption mechanism can achieve very flexible access control, so it has a wide range of applications in the distributed environment, such as fine-grained access control, audit log applications, cloud storage systems. Key-policy attribute-based encryption (KP-ABE) scheme is especiall...

Full description

Saved in:
Bibliographic Details
Published in:Information sciences Vol. 470; pp. 175 - 188
Main Authors: Li, Jiguo, Yu, Qihong, Zhang, Yichen, Shen, Jian
Format: Journal Article
Language:English
Published: Elsevier Inc 01.01.2019
Subjects:
ISSN:0020-0255, 1872-6291
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract Attribute-based encryption mechanism can achieve very flexible access control, so it has a wide range of applications in the distributed environment, such as fine-grained access control, audit log applications, cloud storage systems. Key-policy attribute-based encryption (KP-ABE) scheme is especially suitable for video on demand, pay TV, etc. Most of the existing KP-ABE schemes do not consider the side channel attacks which probably leak some secret information about the cryptosystems. In the paper, we present the formal definition and security model of key-policy attribute-based encryption scheme which is resilient to continual auxiliary input (CAI) leakage. What is more, we present a concrete KP-ABE scheme. The proposed scheme is proved secure under the static assumptions.
AbstractList Attribute-based encryption mechanism can achieve very flexible access control, so it has a wide range of applications in the distributed environment, such as fine-grained access control, audit log applications, cloud storage systems. Key-policy attribute-based encryption (KP-ABE) scheme is especially suitable for video on demand, pay TV, etc. Most of the existing KP-ABE schemes do not consider the side channel attacks which probably leak some secret information about the cryptosystems. In the paper, we present the formal definition and security model of key-policy attribute-based encryption scheme which is resilient to continual auxiliary input (CAI) leakage. What is more, we present a concrete KP-ABE scheme. The proposed scheme is proved secure under the static assumptions.
Author Shen, Jian
Yu, Qihong
Li, Jiguo
Zhang, Yichen
Author_xml – sequence: 1
  givenname: Jiguo
  orcidid: 0000-0002-6532-2081
  surname: Li
  fullname: Li, Jiguo
  email: ljg1688@163.com
  organization: College of Mathematics and Informatics, Fujian Normal University, Fuzhou 350117, China
– sequence: 2
  givenname: Qihong
  surname: Yu
  fullname: Yu, Qihong
  organization: School of Computer Science, Suqian College, Suqian 223800, China
– sequence: 3
  givenname: Yichen
  surname: Zhang
  fullname: Zhang, Yichen
  organization: College of Mathematics and Informatics, Fujian Normal University, Fuzhou 350117, China
– sequence: 4
  givenname: Jian
  surname: Shen
  fullname: Shen, Jian
  organization: School of Computer and Software, Nanjing University of Information Science and Technology, No. 219, Ningliu Road, Nanjing 210044, China
BookMark eNp9kM1OwzAQhC1UJNrCA3DLCySs4zROxAlV_IlKvcDZ2jpOtSU4ke0g-vY4KicOlVa7h9U3mpkFm9neGsZuOWQceHl3yMj6LAdeZSDjyAs255XM0zKv-YzNAXJIIV-trtjC-wMAFLIs52z7Zo7p0HekjwmG4Gg3BpPu0JsmMVa74xCotwnuMeqHRPc2kB2xS3D8oY7QHROywxiSzuAn7s01u2yx8-bm7y7Zx9Pj-_ol3WyfX9cPm1SLUoQUuZCiaGpZ5dg0vF4JLDgvykobUWkUbYG8jqsBLUuBFUKrC5j-kTK7ViyZPOlq13vvTKs0BZy8BofUKQ5q6kUdVPStpl4UyDgykvwfOTj6ikHOMvcnxsRI32Sc8ppiPaYhZ3RQTU9n6F-w8H90
CitedBy_id crossref_primary_10_1109_ACCESS_2024_3381509
crossref_primary_10_1016_j_ins_2019_09_052
crossref_primary_10_3233_WEB_220015
crossref_primary_10_1109_ACCESS_2020_2991579
crossref_primary_10_1109_JSYST_2022_3208149
crossref_primary_10_1109_TIFS_2022_3196271
crossref_primary_10_1016_j_ins_2022_03_081
crossref_primary_10_1155_2019_5280806
crossref_primary_10_20965_jaciii_2023_p0855
crossref_primary_10_1093_comjnl_bxab205
crossref_primary_10_1109_ACCESS_2019_2919726
crossref_primary_10_1007_s11036_023_02102_0
crossref_primary_10_1109_TII_2021_3133345
crossref_primary_10_1016_j_ins_2020_05_092
crossref_primary_10_1109_ACCESS_2022_3210265
crossref_primary_10_1093_comjnl_bxab046
crossref_primary_10_1109_ACCESS_2019_2933542
crossref_primary_10_1016_j_eswa_2022_118545
crossref_primary_10_1108_IJPCC_02_2022_0047
crossref_primary_10_1109_ACCESS_2020_2980886
crossref_primary_10_1177_1550147719841276
crossref_primary_10_1109_ACCESS_2019_2909272
crossref_primary_10_1109_ACCESS_2020_3019774
crossref_primary_10_1155_2021_3573702
crossref_primary_10_1016_j_csi_2024_103854
crossref_primary_10_1155_2022_6849761
crossref_primary_10_1007_s42452_023_05386_9
crossref_primary_10_1155_2018_8738960
crossref_primary_10_3390_electronics13112175
crossref_primary_10_1109_TNSM_2022_3185237
crossref_primary_10_3390_sym15010179
crossref_primary_10_1109_ACCESS_2019_2922646
crossref_primary_10_1155_2020_2345369
crossref_primary_10_1016_j_ins_2019_01_051
crossref_primary_10_1007_s11227_021_03867_5
crossref_primary_10_1016_j_ins_2019_01_052
crossref_primary_10_1002_ett_4190
crossref_primary_10_1049_iet_its_2019_0833
crossref_primary_10_1093_comjnl_bxab017
crossref_primary_10_1007_s00500_019_04219_5
crossref_primary_10_1109_JSYST_2019_2944240
crossref_primary_10_1016_j_seta_2022_102556
crossref_primary_10_1109_ACCESS_2021_3136331
crossref_primary_10_1145_3408322
crossref_primary_10_1016_j_tcs_2018_11_019
crossref_primary_10_1109_JSYST_2020_2978146
crossref_primary_10_1109_ACCESS_2019_2925390
crossref_primary_10_1109_ACCESS_2020_2976746
crossref_primary_10_1093_comjnl_bxaa082
crossref_primary_10_1109_ACCESS_2020_2975813
crossref_primary_10_1109_ACCESS_2020_2995480
crossref_primary_10_1109_TC_2020_3043950
crossref_primary_10_1109_TCC_2019_2929045
crossref_primary_10_3390_s20041088
crossref_primary_10_1109_TBC_2020_2984974
crossref_primary_10_1109_TCC_2020_2975184
crossref_primary_10_1007_s00500_019_04018_y
crossref_primary_10_1109_TAES_2022_3197684
crossref_primary_10_1155_2020_1492681
crossref_primary_10_1109_ACCESS_2020_2969223
crossref_primary_10_1109_TITS_2023_3329488
crossref_primary_10_1145_3442150
crossref_primary_10_1109_TIFS_2024_3419716
crossref_primary_10_1016_j_jisa_2020_102521
crossref_primary_10_1109_TIFS_2022_3173412
crossref_primary_10_1109_ACCESS_2020_2991431
crossref_primary_10_3390_electronics10212685
crossref_primary_10_1016_j_ins_2020_10_058
crossref_primary_10_1109_TDSC_2020_2977646
crossref_primary_10_1109_TKDE_2023_3241198
crossref_primary_10_1109_TSC_2019_2937764
crossref_primary_10_1109_JSYST_2019_2918022
crossref_primary_10_1155_2022_8220259
crossref_primary_10_1093_comjnl_bxy144
crossref_primary_10_3390_electronics13244909
crossref_primary_10_1007_s10623_023_01268_8
crossref_primary_10_1109_TSC_2021_3096420
crossref_primary_10_1109_ACCESS_2020_2969957
crossref_primary_10_1109_JIOT_2024_3468018
crossref_primary_10_1016_j_csi_2020_103471
crossref_primary_10_1109_TETC_2019_2904637
crossref_primary_10_1109_TIFS_2020_2973864
crossref_primary_10_1109_ACCESS_2019_2931531
crossref_primary_10_1109_JIOT_2020_2986303
crossref_primary_10_1155_2022_8350006
crossref_primary_10_1016_j_ins_2019_03_053
crossref_primary_10_3390_s21206821
crossref_primary_10_1016_j_sysarc_2023_102982
crossref_primary_10_1007_s10586_024_04546_9
crossref_primary_10_1007_s11704_019_9189_7
crossref_primary_10_1093_comjnl_bxz085
crossref_primary_10_1155_2019_8093578
crossref_primary_10_1016_j_ins_2021_08_053
crossref_primary_10_1109_JIOT_2021_3104585
crossref_primary_10_1155_2021_5595243
Cites_doi 10.1002/dac.2942
10.1109/TSC.2016.2542813
10.1155/2017/3596205
10.1109/TIFS.2015.2405905
10.1002/sec.1396
10.1137/100813464
10.1145/1506409.1506429
10.1109/TIFS.2016.2601070
10.1016/j.ins.2018.04.067
10.1109/JSYST.2017.2667679
10.1109/TIFS.2013.2271848
10.1109/TIFS.2012.2223683
10.1093/comjnl/bxv128
10.1109/TDSC.2016.2608343
10.1109/TSC.2016.2520932
10.1016/j.jss.2015.05.066
10.1016/j.ins.2017.11.008
10.1049/iet-ifs.2013.0173
10.1007/s00145-015-9200-x
10.1109/TSC.2017.2710190
10.1002/sec.1659
10.1016/j.tcs.2017.10.020
10.1007/s10207-014-0270-9
ContentType Journal Article
Copyright 2018 Elsevier Inc.
Copyright_xml – notice: 2018 Elsevier Inc.
DBID AAYXX
CITATION
DOI 10.1016/j.ins.2018.07.077
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Library & Information Science
EISSN 1872-6291
EndPage 188
ExternalDocumentID 10_1016_j_ins_2018_07_077
S0020025516308374
GroupedDBID --K
--M
--Z
-~X
.DC
.~1
0R~
1B1
1OL
1RT
1~.
1~5
29I
4.4
457
4G.
5GY
5VS
7-5
71M
8P~
9JN
9JO
AAAKF
AAAKG
AABNK
AACTN
AAEDT
AAEDW
AAIAV
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AAQXK
AARIN
AAXUO
AAYFN
ABAOU
ABBOA
ABEFU
ABFNM
ABJNI
ABMAC
ABTAH
ABUCO
ABXDB
ABYKQ
ACAZW
ACDAQ
ACGFS
ACNNM
ACRLP
ACZNC
ADBBV
ADEZE
ADGUI
ADJOM
ADMUD
ADTZH
AEBSH
AECPX
AEKER
AENEX
AFFNX
AFKWA
AFTJW
AGHFR
AGUBO
AGYEJ
AHHHB
AHJVU
AHZHX
AIALX
AIEXJ
AIGVJ
AIKHN
AITUG
AJBFU
AJOXV
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
AOUOD
APLSM
ARUGR
ASPBG
AVWKF
AXJTR
AZFZN
BJAXD
BKOJK
BLXMC
CS3
DU5
EBS
EFJIC
EFLBG
EJD
EO8
EO9
EP2
EP3
F5P
FDB
FEDTE
FGOYB
FIRID
FNPLU
FYGXN
G-Q
GBLVA
GBOLZ
HAMUX
HLZ
HVGLF
HZ~
H~9
IHE
J1W
JJJVA
KOM
LG9
LY1
M41
MHUIS
MO0
MS~
N9A
O-L
O9-
OAUVE
OZT
P-8
P-9
P2P
PC.
Q38
R2-
RIG
ROL
RPZ
SBC
SDF
SDG
SDP
SDS
SES
SEW
SPC
SPCBC
SSB
SSD
SST
SSV
SSW
SSZ
T5K
TN5
TWZ
UHS
WH7
WUQ
XPP
YYP
ZMT
ZY4
~02
~G-
77I
9DU
AATTM
AAXKI
AAYWO
AAYXX
ABWVN
ACLOT
ACRPL
ACVFH
ADCNI
ADNMO
ADVLN
AEIPS
AEUPX
AFJKZ
AFPUW
AGQPQ
AIGII
AIIUN
AKBMS
AKRWK
AKYEP
ANKPU
APXCP
CITATION
EFKBS
~HD
ID FETCH-LOGICAL-c363t-a13734d9782add1953a411468ce38ca3f4a19f4ad0c763a8a0fc40468c34debf3
ISICitedReferencesCount 106
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000447482100012&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 0020-0255
IngestDate Sat Nov 29 06:25:07 EST 2025
Tue Nov 18 22:19:51 EST 2025
Fri Feb 23 02:33:54 EST 2024
IsPeerReviewed true
IsScholarly true
Keywords Dual system encryption
Continual auxiliary input leakage
Static assumptions
Key-policy attribute-based encryption
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c363t-a13734d9782add1953a411468ce38ca3f4a19f4ad0c763a8a0fc40468c34debf3
ORCID 0000-0002-6532-2081
PageCount 14
ParticipantIDs crossref_citationtrail_10_1016_j_ins_2018_07_077
crossref_primary_10_1016_j_ins_2018_07_077
elsevier_sciencedirect_doi_10_1016_j_ins_2018_07_077
PublicationCentury 2000
PublicationDate January 2019
2019-01-00
PublicationDateYYYYMMDD 2019-01-01
PublicationDate_xml – month: 01
  year: 2019
  text: January 2019
PublicationDecade 2010
PublicationTitle Information sciences
PublicationYear 2019
Publisher Elsevier Inc
Publisher_xml – name: Elsevier Inc
References Micali, Reyzin (bib0037) 2004; 2951
Sahai, Waters (bib0044) 2005; 3494
Li, Guo, Yu, Lu, Zhang (bib0022) 2016; 9
Qin, Liu, Chen (bib0043) 2013; 9
Li, Shi, Zhang (bib0026) 2017; 30
Goyal, Pandey, Sahai, Waters (bib0009) 2006
Li, Yan, Zhang (bib0030) 2017
Waters (bib0046) 2009; 5677
Yan, Li, Han, Zhang (bib0047) 2017; 12
Lewko, Waters (bib0020) 2010; 5978
Naor, Segev (bib0038) 2012; 41
Lewko, Okamoto, Sahai, Takashima, Waters (bib0016) 2010; 6110
Ning, Dong, Cao, Wei, Lin (bib0039) 2015; 10
Lai, Deng, Guan, Weng (bib0014) 2013; 8
Halderman, Schoen, Heninger, Clarkson, Paul, Calandrino, Feldman, Appelbaum, Felten (bib0012) 2009; 52
.
Dodis, Goldwasser, Kalai, Peikert, Vaikuntanathan (bib0006) 2010; 5978
Li, Wang, Zhang, Han (bib0028) 2017
Brakerski, Kalai, Katz, Vaikuntanathan (bib0003) 2010
Dziembowski, Pietrzak (bib0008) 2008
Li, Yu, Zhang (bib0034) 2018
J. Ning, Z. Cao, X. Dong, L. Wei, White-box traceable CP-ABE for cloud storage service: how to catch people leaking their access credentials effectively. IEEE Trans. Dependable Secure Comput. (2016) DOI
Lewko, Rouselakis, Waters (bib0017) 2011; 6597
Li, Chen, Lu, Zhang (bib0021) 2018; 454-455
Boneh, Goh, Nissim (bib0002) 2005; 3378
Liu, Weng, Zhao (bib0035) 2013; 7779
Waters (bib0045) 2011; 6571
Li, Yu, Zhang (bib0033) 2018; 429
Lewko, Sahai, Waters (bib0018) 2010
Li, Wang, Zhang, Shen (bib0029) 2016; 10
Cheung, Newport (bib0005) 2007
Lewko, Waters (bib0019) 2011; 6632
Guo, Li, Lu, Zhang, Zhang (bib0010) 2018; 711
Chase (bib0004) 2007; 4392
Yu, Li, Zhang, Wu, Huang, Xiang (bib0048) 2016; 116
Guo, Li, Zhang, Shen (bib0011) 2016; 9
Zhang, Chen, Li, Li (bib0050) 2013
Dodis, Haralambiev, Lopez-Alt, Wichs (bib0007) 2010
Li, Yao, Han, Zhang, Shen (bib0031) 2018; 12
Li, Sha, Zhang, Huang, Shen (bib0025) 2017; 2017
Li, Teng, Zhang, Yu (bib0027) 2016; 59
Lai, Deng, Li, Wang (bib0015) 2014
Li, Lin, Zhang, Han (bib0024) 2017; 10
Li, Guo, Yu, Lu, Zhang, Zhang (bib0023) 2016; 355–356
Akavia, Goldwasser, Vaikuntanathan (bib0001) 2009; 5444
Hazay, López-Alt, Wee, Wichs (bib0013) 2016; 29
Liu, Cao, Wong (bib0036) 2013; 8
Yuen, Chow, Zhang, Yiu (bib0049) 2012; 7237
Li, Yao, Zhang, Qian, Han (bib0032) 2017; 10
Ostrovsky, Sahai, Waters (bib0041) 2007
Qian, Li, Zhang, Han (bib0042) 2015; 14
Qin (10.1016/j.ins.2018.07.077_bib0043) 2013; 9
Naor (10.1016/j.ins.2018.07.077_bib0038) 2012; 41
10.1016/j.ins.2018.07.077_bib0040
Hazay (10.1016/j.ins.2018.07.077_bib0013) 2016; 29
Ostrovsky (10.1016/j.ins.2018.07.077_bib0041) 2007
Li (10.1016/j.ins.2018.07.077_bib0025) 2017; 2017
Lewko (10.1016/j.ins.2018.07.077_bib0016) 2010; 6110
Sahai (10.1016/j.ins.2018.07.077_bib0044) 2005; 3494
Li (10.1016/j.ins.2018.07.077_bib0029) 2016; 10
Lewko (10.1016/j.ins.2018.07.077_bib0017) 2011; 6597
Li (10.1016/j.ins.2018.07.077_bib0028) 2017
Liu (10.1016/j.ins.2018.07.077_bib0035) 2013; 7779
Ning (10.1016/j.ins.2018.07.077_bib0039) 2015; 10
Zhang (10.1016/j.ins.2018.07.077_bib0050) 2013
Lewko (10.1016/j.ins.2018.07.077_bib0019) 2011; 6632
Liu (10.1016/j.ins.2018.07.077_bib0036) 2013; 8
Lai (10.1016/j.ins.2018.07.077_bib0015) 2014
Micali (10.1016/j.ins.2018.07.077_bib0037) 2004; 2951
Akavia (10.1016/j.ins.2018.07.077_bib0001) 2009; 5444
Li (10.1016/j.ins.2018.07.077_bib0031) 2018; 12
Waters (10.1016/j.ins.2018.07.077_bib0046) 2009; 5677
Li (10.1016/j.ins.2018.07.077_bib0032) 2017; 10
Li (10.1016/j.ins.2018.07.077_bib0021) 2018; 454-455
Dziembowski (10.1016/j.ins.2018.07.077_bib0008) 2008
Li (10.1016/j.ins.2018.07.077_bib0023) 2016; 355–356
Lewko (10.1016/j.ins.2018.07.077_bib0020) 2010; 5978
Dodis (10.1016/j.ins.2018.07.077_bib0006) 2010; 5978
Lai (10.1016/j.ins.2018.07.077_bib0014) 2013; 8
Yu (10.1016/j.ins.2018.07.077_bib0048) 2016; 116
Li (10.1016/j.ins.2018.07.077_bib0033) 2018; 429
Halderman (10.1016/j.ins.2018.07.077_bib0012) 2009; 52
Dodis (10.1016/j.ins.2018.07.077_bib0007) 2010
Yan (10.1016/j.ins.2018.07.077_bib0047) 2017; 12
Guo (10.1016/j.ins.2018.07.077_bib0011) 2016; 9
Goyal (10.1016/j.ins.2018.07.077_bib0009) 2006
Chase (10.1016/j.ins.2018.07.077_bib0004) 2007; 4392
Yuen (10.1016/j.ins.2018.07.077_bib0049) 2012; 7237
Waters (10.1016/j.ins.2018.07.077_bib0045) 2011; 6571
Li (10.1016/j.ins.2018.07.077_bib0022) 2016; 9
Boneh (10.1016/j.ins.2018.07.077_bib0002) 2005; 3378
Brakerski (10.1016/j.ins.2018.07.077_bib0003) 2010
Li (10.1016/j.ins.2018.07.077_bib0027) 2016; 59
Li (10.1016/j.ins.2018.07.077_bib0030) 2017
Guo (10.1016/j.ins.2018.07.077_bib0010) 2018; 711
Li (10.1016/j.ins.2018.07.077_bib0024) 2017; 10
Qian (10.1016/j.ins.2018.07.077_bib0042) 2015; 14
Lewko (10.1016/j.ins.2018.07.077_bib0018) 2010
Li (10.1016/j.ins.2018.07.077_bib0026) 2017; 30
Li (10.1016/j.ins.2018.07.077_bib0034) 2018
Cheung (10.1016/j.ins.2018.07.077_bib0005) 2007
References_xml – volume: 14
  start-page: 487
  year: 2015
  end-page: 497
  ident: bib0042
  article-title: Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation
  publication-title: Int. J. Inf. Secur.
– volume: 7237
  start-page: 117
  year: 2012
  end-page: 134
  ident: bib0049
  article-title: Identity-based encryption resilient to continual auxiliary leakage
  publication-title: EUROCRYPT 2012
– volume: 2017
  year: 2017
  ident: bib0025
  article-title: Verifiable outsourced decryption of attribute-based encryption with constant ciphertext length
  publication-title: Secur. Commun. Netw.
– start-page: 239
  year: 2014
  end-page: 248
  ident: bib0015
  article-title: Fully secure key-policy attribute-based encryption with constant-size ciphertexts and fast decryption
  publication-title: ASIACCS
– volume: 6110
  start-page: 62
  year: 2010
  end-page: 91
  ident: bib0016
  article-title: Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption
  publication-title: EUROCRYPT
– volume: 6571
  start-page: 53
  year: 2011
  end-page: 70
  ident: bib0045
  article-title: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization
  publication-title: PKC 2011
– volume: 116
  start-page: 101
  year: 2016
  end-page: 112
  ident: bib0048
  article-title: Certificate-based encryption resilient to key leakage
  publication-title: J. Syst. Software
– volume: 10
  start-page: 715
  year: 2017
  end-page: 725
  ident: bib0024
  article-title: KSF-OABE: outsourced attribute-based encryption with keyword search function for cloud storage
  publication-title: IEEE Trans. Serv. Comput.
– volume: 9
  start-page: 1016
  year: 2016
  end-page: 1024
  ident: bib0022
  article-title: Provably secure identity-based encryption resilient to post-challenge continuous auxiliary inputs leakage
  publication-title: Secur. Commun. Netw.
– volume: 59
  start-page: 1066
  year: 2016
  end-page: 1075
  ident: bib0027
  article-title: A leakage-resilient CCA-secure identity-based encryption scheme
  publication-title: Comp. J.
– year: 2017
  ident: bib0028
  article-title: Full verifiability for outsourced decryption in attribute based encryption
  publication-title: IEEE Trans. Serv. Comput.
– volume: 8
  start-page: 76
  year: 2013
  end-page: 88
  ident: bib0036
  article-title: White-box traceable ciphertext-policy attribute-based encryption supporting any monotone access structures
  publication-title: IEEE Trans. Inf. Forensics Secur.
– volume: 10
  start-page: 1274
  year: 2015
  end-page: 1288
  ident: bib0039
  article-title: White-box traceable ciphertext-policy attribute-based encryption supporting flexible attributes
  publication-title: IEEE Trans. Inf. Forensics Secur.
– volume: 5978
  start-page: 361
  year: 2010
  end-page: 381
  ident: bib0006
  article-title: Public-key encryption schemes with auxiliary inputs
  publication-title: TCC 2010
– volume: 12
  start-page: 1767
  year: 2018
  end-page: 1777
  ident: bib0031
  article-title: User collusion avoidance CP-ABE with efficient attribute revocation for cloud storage
  publication-title: IEEE Syst. J.
– volume: 3494
  start-page: 457
  year: 2005
  end-page: 473
  ident: bib0044
  article-title: Fuzzy identity-based encryption
  publication-title: EUROCRYPT 2005
– volume: 30
  year: 2017
  ident: bib0026
  article-title: Searchable ciphertext-policy attribute-based encryption with revocation in cloud storage
  publication-title: Int. J. Commun. Syst.
– reference: J. Ning, Z. Cao, X. Dong, L. Wei, White-box traceable CP-ABE for cloud storage service: how to catch people leaking their access credentials effectively. IEEE Trans. Dependable Secure Comput. (2016) DOI:
– volume: 9
  start-page: 32
  year: 2013
  end-page: 42
  ident: bib0043
  article-title: Efficient chosen-ciphertext secure public-key encryption scheme with high leakage-resilience
  publication-title: IET Inf. Secur.
– volume: 711
  start-page: 1
  year: 2018
  end-page: 10
  ident: bib0010
  article-title: Provably secure certificate-based encryption with leakage resilience
  publication-title: Theor. Comp. Sci.
– start-page: 273
  year: 2010
  end-page: 285
  ident: bib0018
  article-title: Revocation systems with very small private keys
  publication-title: SP 2010, IEEE Computer Society
– volume: 3378
  start-page: 325
  year: 2005
  end-page: 341
  ident: bib0002
  article-title: Evaluating 2-dnf formulas on ciphertexts
  publication-title: TCC 2005
– volume: 6632
  start-page: 547
  year: 2011
  end-page: 567
  ident: bib0019
  article-title: Unbounded HIBE and attribute-based encryption
  publication-title: EUROCRYPT
– volume: 41
  start-page: 772
  year: 2012
  end-page: 814
  ident: bib0038
  article-title: Public-key cryptosystems resilient to key leakage
  publication-title: SIAM J. Comput.
– volume: 29
  start-page: 514
  year: 2016
  end-page: 551
  ident: bib0013
  article-title: Leakage-resilient cryptography from minimal assumptions
  publication-title: J. Cryptol.
– start-page: 501
  year: 2010
  end-page: 510
  ident: bib0003
  article-title: Overcoming the hole in the bucket: public-key cryptography resilient to continual memory leakage
  publication-title: FOCS 2010, IEEE Computer Society
– start-page: 456
  year: 2007
  end-page: 465
  ident: bib0005
  article-title: Provably secure ciphertext policy ABE
  publication-title: CCS 2007
– volume: 355–356
  start-page: 1
  year: 2016
  end-page: 14
  ident: bib0023
  article-title: Continuous leakage-resilient certificate-based encryption
  publication-title: Inf. Sci.
– volume: 5677
  start-page: 619
  year: 2009
  end-page: 636
  ident: bib0046
  article-title: Dual system encryption: realizing fully secure IBE and HIBE under simple assumptions
  publication-title: CRYPTO 2009
– year: 2018
  ident: bib0034
  article-title: Hierarchical attribute based encryption with continuous leakage-resilience
  publication-title: Inf. Sci.
– volume: 429
  start-page: 177
  year: 2018
  end-page: 193
  ident: bib0033
  article-title: Identity-based broadcast encryption with continuous leakage resilience
  publication-title: Inf. Sci.
– year: 2017
  ident: bib0030
  article-title: Certificateless public integrity checking of group shared data on cloud storage
  publication-title: IEEE Trans. Serv. Comput.
– volume: 6597
  start-page: 70
  year: 2011
  end-page: 88
  ident: bib0017
  article-title: Achieving leakage resilience through dual system encryption
  publication-title: TCC
– volume: 10
  start-page: 3339
  year: 2016
  end-page: 3352
  ident: bib0029
  article-title: Ciphertext-policy attribute-based encryption with hidden access policy and testing
  publication-title: KSII Trans. Internet Inf. Syst.
– volume: 4392
  start-page: 515
  year: 2007
  end-page: 534
  ident: bib0004
  article-title: Multi-authority attribute based encryption
  publication-title: TCC 2007
– volume: 2951
  start-page: 278
  year: 2004
  end-page: 296
  ident: bib0037
  article-title: Physically observable cryptography
  publication-title: TCC
– start-page: 89
  year: 2006
  end-page: 98
  ident: bib0009
  article-title: Attribute-based encryption for fine-grained access control of encrypted data
  publication-title: CCS
– start-page: 511
  year: 2013
  end-page: 516
  ident: bib0050
  article-title: Anonymous attribute-based encryption supporting efficient decryption test
  publication-title: ASIACCS 2013
– volume: 9
  start-page: 4852
  year: 2016
  end-page: 4862
  ident: bib0011
  article-title: Hierarchical attribute-based encryption with continuous auxiliary inputs leakage
  publication-title: Secur. Commun. Netw.
– volume: 7779
  start-page: 84
  year: 2013
  end-page: 100
  ident: bib0035
  article-title: Efficient public key cryptosystem resilient to key leakage chosen ciphertext attacks
  publication-title: CT-RSA
– volume: 5444
  start-page: 474
  year: 2009
  end-page: 495
  ident: bib0001
  article-title: Simultaneous hardcore bits and cryptography against memory attacks
  publication-title: TCC 2009
– start-page: 293
  year: 2008
  end-page: 302
  ident: bib0008
  article-title: Leakage-resilient cryptography
  publication-title: FOCS 2008, IEEE Computer Society
– reference: .
– start-page: 511
  year: 2010
  end-page: 520
  ident: bib0007
  article-title: Cryptography against continuous memory attacks
  publication-title: FOCS
– volume: 10
  start-page: 785
  year: 2017
  end-page: 796
  ident: bib0032
  article-title: Flexible and fine-grained attribute-based data storage in cloud computing
  publication-title: IEEE Trans. Serv. Comput.
– volume: 52
  start-page: 91
  year: 2009
  end-page: 98
  ident: bib0012
  article-title: Lest we remember: cold-boot attacks on encryption keys
  publication-title: Commun. ACM
– volume: 5978
  start-page: 455
  year: 2010
  end-page: 479
  ident: bib0020
  article-title: New techniques for dual system encryption and fully secure hibe with short ciphertexts
  publication-title: TCC
– volume: 12
  start-page: 78
  year: 2017
  end-page: 88
  ident: bib0047
  article-title: A novel efficient remote data possession checking protocol in cloud storage
  publication-title: IEEE Trans. Inf. Forensics Secur.
– volume: 454-455
  start-page: 110
  year: 2018
  end-page: 127
  ident: bib0021
  article-title: Anonymous certificate-based broadcast encryption with constant decryption cost
  publication-title: Inf. Sci.
– volume: 8
  start-page: 1343
  year: 2013
  end-page: 1354
  ident: bib0014
  article-title: Attribute-based encryption with verifiable outsourced decryption
  publication-title: IEEE Trans. Inf. Forensics Secur.
– start-page: 195
  year: 2007
  end-page: 203
  ident: bib0041
  article-title: Attribute-based encryption with non-monotonic access structures
  publication-title: CCS 2007
– volume: 5978
  start-page: 361
  year: 2010
  ident: 10.1016/j.ins.2018.07.077_bib0006
  article-title: Public-key encryption schemes with auxiliary inputs
– volume: 7237
  start-page: 117
  year: 2012
  ident: 10.1016/j.ins.2018.07.077_bib0049
  article-title: Identity-based encryption resilient to continual auxiliary leakage
– volume: 6597
  start-page: 70
  year: 2011
  ident: 10.1016/j.ins.2018.07.077_bib0017
  article-title: Achieving leakage resilience through dual system encryption
– volume: 30
  issue: 1
  year: 2017
  ident: 10.1016/j.ins.2018.07.077_bib0026
  article-title: Searchable ciphertext-policy attribute-based encryption with revocation in cloud storage
  publication-title: Int. J. Commun. Syst.
  doi: 10.1002/dac.2942
– volume: 10
  start-page: 715
  issue: 5
  year: 2017
  ident: 10.1016/j.ins.2018.07.077_bib0024
  article-title: KSF-OABE: outsourced attribute-based encryption with keyword search function for cloud storage
  publication-title: IEEE Trans. Serv. Comput.
  doi: 10.1109/TSC.2016.2542813
– volume: 10
  start-page: 3339
  issue: 7
  year: 2016
  ident: 10.1016/j.ins.2018.07.077_bib0029
  article-title: Ciphertext-policy attribute-based encryption with hidden access policy and testing
  publication-title: KSII Trans. Internet Inf. Syst.
– volume: 2017
  year: 2017
  ident: 10.1016/j.ins.2018.07.077_bib0025
  article-title: Verifiable outsourced decryption of attribute-based encryption with constant ciphertext length
  publication-title: Secur. Commun. Netw.
  doi: 10.1155/2017/3596205
– volume: 3494
  start-page: 457
  year: 2005
  ident: 10.1016/j.ins.2018.07.077_bib0044
  article-title: Fuzzy identity-based encryption
– year: 2017
  ident: 10.1016/j.ins.2018.07.077_bib0030
  article-title: Certificateless public integrity checking of group shared data on cloud storage
  publication-title: IEEE Trans. Serv. Comput.
– volume: 10
  start-page: 1274
  issue: 6
  year: 2015
  ident: 10.1016/j.ins.2018.07.077_bib0039
  article-title: White-box traceable ciphertext-policy attribute-based encryption supporting flexible attributes
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2015.2405905
– volume: 9
  start-page: 1016
  issue: 10
  year: 2016
  ident: 10.1016/j.ins.2018.07.077_bib0022
  article-title: Provably secure identity-based encryption resilient to post-challenge continuous auxiliary inputs leakage
  publication-title: Secur. Commun. Netw.
  doi: 10.1002/sec.1396
– volume: 41
  start-page: 772
  issue: 4
  year: 2012
  ident: 10.1016/j.ins.2018.07.077_bib0038
  article-title: Public-key cryptosystems resilient to key leakage
  publication-title: SIAM J. Comput.
  doi: 10.1137/100813464
– volume: 6632
  start-page: 547
  year: 2011
  ident: 10.1016/j.ins.2018.07.077_bib0019
  article-title: Unbounded HIBE and attribute-based encryption
– volume: 52
  start-page: 91
  issue: 5
  year: 2009
  ident: 10.1016/j.ins.2018.07.077_bib0012
  article-title: Lest we remember: cold-boot attacks on encryption keys
  publication-title: Commun. ACM
  doi: 10.1145/1506409.1506429
– volume: 5677
  start-page: 619
  year: 2009
  ident: 10.1016/j.ins.2018.07.077_bib0046
  article-title: Dual system encryption: realizing fully secure IBE and HIBE under simple assumptions
– volume: 6571
  start-page: 53
  year: 2011
  ident: 10.1016/j.ins.2018.07.077_bib0045
  article-title: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization
– start-page: 273
  year: 2010
  ident: 10.1016/j.ins.2018.07.077_bib0018
  article-title: Revocation systems with very small private keys
– volume: 7779
  start-page: 84
  year: 2013
  ident: 10.1016/j.ins.2018.07.077_bib0035
  article-title: Efficient public key cryptosystem resilient to key leakage chosen ciphertext attacks
– start-page: 195
  year: 2007
  ident: 10.1016/j.ins.2018.07.077_bib0041
  article-title: Attribute-based encryption with non-monotonic access structures
– start-page: 239
  year: 2014
  ident: 10.1016/j.ins.2018.07.077_bib0015
  article-title: Fully secure key-policy attribute-based encryption with constant-size ciphertexts and fast decryption
– start-page: 293
  year: 2008
  ident: 10.1016/j.ins.2018.07.077_bib0008
  article-title: Leakage-resilient cryptography
– volume: 5978
  start-page: 455
  year: 2010
  ident: 10.1016/j.ins.2018.07.077_bib0020
  article-title: New techniques for dual system encryption and fully secure hibe with short ciphertexts
– volume: 2951
  start-page: 278
  year: 2004
  ident: 10.1016/j.ins.2018.07.077_bib0037
  article-title: Physically observable cryptography
– volume: 12
  start-page: 78
  issue: 1
  year: 2017
  ident: 10.1016/j.ins.2018.07.077_bib0047
  article-title: A novel efficient remote data possession checking protocol in cloud storage
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2016.2601070
– volume: 454-455
  start-page: 110
  year: 2018
  ident: 10.1016/j.ins.2018.07.077_bib0021
  article-title: Anonymous certificate-based broadcast encryption with constant decryption cost
  publication-title: Inf. Sci.
  doi: 10.1016/j.ins.2018.04.067
– volume: 355–356
  start-page: 1
  year: 2016
  ident: 10.1016/j.ins.2018.07.077_bib0023
  article-title: Continuous leakage-resilient certificate-based encryption
  publication-title: Inf. Sci.
– year: 2018
  ident: 10.1016/j.ins.2018.07.077_bib0034
  article-title: Hierarchical attribute based encryption with continuous leakage-resilience
  publication-title: Inf. Sci.
– volume: 12
  start-page: 1767
  issue: 2
  year: 2018
  ident: 10.1016/j.ins.2018.07.077_bib0031
  article-title: User collusion avoidance CP-ABE with efficient attribute revocation for cloud storage
  publication-title: IEEE Syst. J.
  doi: 10.1109/JSYST.2017.2667679
– volume: 8
  start-page: 1343
  issue: 8
  year: 2013
  ident: 10.1016/j.ins.2018.07.077_bib0014
  article-title: Attribute-based encryption with verifiable outsourced decryption
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2013.2271848
– volume: 8
  start-page: 76
  issue: 1
  year: 2013
  ident: 10.1016/j.ins.2018.07.077_bib0036
  article-title: White-box traceable ciphertext-policy attribute-based encryption supporting any monotone access structures
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2012.2223683
– volume: 59
  start-page: 1066
  issue: 7
  year: 2016
  ident: 10.1016/j.ins.2018.07.077_bib0027
  article-title: A leakage-resilient CCA-secure identity-based encryption scheme
  publication-title: Comp. J.
  doi: 10.1093/comjnl/bxv128
– ident: 10.1016/j.ins.2018.07.077_bib0040
  doi: 10.1109/TDSC.2016.2608343
– volume: 5444
  start-page: 474
  year: 2009
  ident: 10.1016/j.ins.2018.07.077_bib0001
  article-title: Simultaneous hardcore bits and cryptography against memory attacks
– volume: 10
  start-page: 785
  issue: 5
  year: 2017
  ident: 10.1016/j.ins.2018.07.077_bib0032
  article-title: Flexible and fine-grained attribute-based data storage in cloud computing
  publication-title: IEEE Trans. Serv. Comput.
  doi: 10.1109/TSC.2016.2520932
– volume: 6110
  start-page: 62
  year: 2010
  ident: 10.1016/j.ins.2018.07.077_bib0016
  article-title: Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption
– volume: 116
  start-page: 101
  year: 2016
  ident: 10.1016/j.ins.2018.07.077_bib0048
  article-title: Certificate-based encryption resilient to key leakage
  publication-title: J. Syst. Software
  doi: 10.1016/j.jss.2015.05.066
– start-page: 89
  year: 2006
  ident: 10.1016/j.ins.2018.07.077_bib0009
  article-title: Attribute-based encryption for fine-grained access control of encrypted data
– volume: 429
  start-page: 177
  issue: 3
  year: 2018
  ident: 10.1016/j.ins.2018.07.077_bib0033
  article-title: Identity-based broadcast encryption with continuous leakage resilience
  publication-title: Inf. Sci.
  doi: 10.1016/j.ins.2017.11.008
– volume: 9
  start-page: 32
  issue: 1
  year: 2013
  ident: 10.1016/j.ins.2018.07.077_bib0043
  article-title: Efficient chosen-ciphertext secure public-key encryption scheme with high leakage-resilience
  publication-title: IET Inf. Secur.
  doi: 10.1049/iet-ifs.2013.0173
– start-page: 501
  year: 2010
  ident: 10.1016/j.ins.2018.07.077_bib0003
  article-title: Overcoming the hole in the bucket: public-key cryptography resilient to continual memory leakage
– start-page: 456
  year: 2007
  ident: 10.1016/j.ins.2018.07.077_bib0005
  article-title: Provably secure ciphertext policy ABE
– volume: 3378
  start-page: 325
  year: 2005
  ident: 10.1016/j.ins.2018.07.077_bib0002
  article-title: Evaluating 2-dnf formulas on ciphertexts
– volume: 4392
  start-page: 515
  year: 2007
  ident: 10.1016/j.ins.2018.07.077_bib0004
  article-title: Multi-authority attribute based encryption
– volume: 29
  start-page: 514
  issue: 3
  year: 2016
  ident: 10.1016/j.ins.2018.07.077_bib0013
  article-title: Leakage-resilient cryptography from minimal assumptions
  publication-title: J. Cryptol.
  doi: 10.1007/s00145-015-9200-x
– year: 2017
  ident: 10.1016/j.ins.2018.07.077_bib0028
  article-title: Full verifiability for outsourced decryption in attribute based encryption
  publication-title: IEEE Trans. Serv. Comput.
  doi: 10.1109/TSC.2017.2710190
– start-page: 511
  year: 2013
  ident: 10.1016/j.ins.2018.07.077_bib0050
  article-title: Anonymous attribute-based encryption supporting efficient decryption test
– volume: 9
  start-page: 4852
  issue: 18
  year: 2016
  ident: 10.1016/j.ins.2018.07.077_bib0011
  article-title: Hierarchical attribute-based encryption with continuous auxiliary inputs leakage
  publication-title: Secur. Commun. Netw.
  doi: 10.1002/sec.1659
– volume: 711
  start-page: 1
  year: 2018
  ident: 10.1016/j.ins.2018.07.077_bib0010
  article-title: Provably secure certificate-based encryption with leakage resilience
  publication-title: Theor. Comp. Sci.
  doi: 10.1016/j.tcs.2017.10.020
– start-page: 511
  year: 2010
  ident: 10.1016/j.ins.2018.07.077_bib0007
  article-title: Cryptography against continuous memory attacks
– volume: 14
  start-page: 487
  issue: 6
  year: 2015
  ident: 10.1016/j.ins.2018.07.077_bib0042
  article-title: Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation
  publication-title: Int. J. Inf. Secur.
  doi: 10.1007/s10207-014-0270-9
SSID ssj0004766
Score 2.564046
Snippet Attribute-based encryption mechanism can achieve very flexible access control, so it has a wide range of applications in the distributed environment, such as...
SourceID crossref
elsevier
SourceType Enrichment Source
Index Database
Publisher
StartPage 175
SubjectTerms Continual auxiliary input leakage
Dual system encryption
Key-policy attribute-based encryption
Static assumptions
Title Key-policy attribute-based encryption against continual auxiliary input leakage
URI https://dx.doi.org/10.1016/j.ins.2018.07.077
Volume 470
WOSCitedRecordID wos000447482100012&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVESC
  databaseName: Elsevier SD Freedom Collection Journals 2021
  customDbUrl:
  eissn: 1872-6291
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0004766
  issn: 0020-0255
  databaseCode: AIEXJ
  dateStart: 19950101
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3NT9swFLc64LAdpgGbYBvIh2mHIUtJY-r4iCYQY4htGkPdKXIcBwJVWnUJKv_9nj8bykBwmFRZlVO7aX6_vvdsvw-EPrAkVryIAYFikBM66FOSD0pOpIAReU53c5NI--yYnZykwyH_3uuVPhbmesTqOp3N-OS_Qg19ALYOnX0C3GFS6ID3ADq0ADu0jwL-q7ohE5Ptd0c0tp6VIlpZFTtwm9MbKyPEuajAMjSu6pVJsS_aWTWqtBNdVU_aRteTuBK3PYVc7JKZwKnOYJIfG7eAo-q8HQdJ0uquH9XF2KnH7gb1b-2DGpj50weJeLa6jQgd-xQ2InxgQET0EqUrXKktC-LEY2yrpDhNG9uCfneEuN1PuISVh86nHqcmu6or9nIrYfaCIgvuhd5z7TKDKTI9RRYxeLFnaLnPdjlIv-W9L_vDo3kELbOn2v4n-PNv4wm4cB__tmA6VsnpK_TSLSfwnqXBKuqpeg296CSZXENbLjQFf8Qd_LAT6uvo25wweIEweE4Y7AiDA2FwIAw2hMGOMK_Rr4P908-HxJXZIDIZJA0RccISWnCwFUHZ6WNVQXWseipVkkqRlFTEHJoikqCMRCqiUtJIX4dRKi-TN2ipHtdqA2GwdnLOy1RGVFIJi_moXzIBJnLRLxVI_k0U-UeXSZeDXpdCGWX3QraJPoUhE5uA5aEPU49H5v4G1jLMgFv3D3v7lO94h57P2f8eLTXTVm2hFXndVH-m245YfwFHwpOg
linkProvider Elsevier
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Key-policy+attribute-based+encryption+against+continual+auxiliary+input+leakage&rft.jtitle=Information+sciences&rft.au=Li%2C+Jiguo&rft.au=Yu%2C+Qihong&rft.au=Zhang%2C+Yichen&rft.au=Shen%2C+Jian&rft.date=2019-01-01&rft.issn=0020-0255&rft.volume=470&rft.spage=175&rft.epage=188&rft_id=info:doi/10.1016%2Fj.ins.2018.07.077&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_ins_2018_07_077
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0020-0255&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0020-0255&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0020-0255&client=summon