Delegation in functional encryption
Texte intégral
Documents relatifs
More precisely, using linear secret sharing schemes, we design Attribute-Based Key Encapsulation Mechanisms (ABKEM) with the Homomorphic-Policy property: given several encapsulations
More precisely, using linear secret sharing schemes (LSSS), we design Attribute-Based Key Encapsulation Mechanisms (ABKEM) with our new Homomorphic-Policy property..
1) Phase 1: The resource-constrained device (noted A in Figure-2) which has to encrypt a message M , select n trusted nodes among those situated in its neighborhood, these
In this chapter, we look at existing techniques for querying encrypted data and use our Homomorphic Query Processing method in conjunction with a keyword search technique proposed
The purpose of this paper is the research of the matrix-based knap- sack cipher in the context of additively homomorphic encryption and its appli- cation in secret
Literature [8] pro- posed a fine-grained ciphertext access control scheme supporting user attribute revocation mechanism.... Literature [9] proposed a new access structure based
[14] proposed an encryption system using trusted third party, who issues authentication information embed user key to achieve better safety in decryption phase
Only re- cipients who have attributes which satisfy the access policy and whose identity is not in the list of revoked users will be able to decrypt the mes- sage.The proposed