Security Weaknesses of an "Anonymous Attribute Based Encryption: Appeared in Asiaccs'13

Download Now
Provided by: International Association for Cryptologic Research
Topic: Cloud
Format: PDF
Attribute-Based Encryption (ABE) has found enormous application in ne-grained access control of shared data, particularly in public cloud. The researcher proposed a scheme called match-then-decrypt, where before running the decryption algorithm the user requires to perform a match operation with attribute(s) that provides the required information to identify whether a particular user is the intended recipient for the cipher-text. As in, the match-then-decrypt operation saves the computational cost at the receiver and the scheme supports receivers' anonymity.
Download Now

Find By Topic