![]() By employing ciphertext policy ABE, proposes the primitive functions to implement a secret-sharing scheme, which provides message authenticity. The secret is split among secret key components belonging to different attributes owned by a user to provide collusion resistance. The features of ABE make it a good candidate for authentication in WBANs.Ĭiphertext policy ABE was proposed in to provide role-based access control on encrypted data in WBANs. A crucial security feature of ABE is collusion-resistance, so any user key cannot be derived by collusion. In this way, only a group of users satisfying a certain access protocol can read the ciphertext. The decryption of a ciphertext is possible only if the set of attributes of the user key matches the attributes of the ciphertext. Lu Shi, in Wearable Sensors, 2014 2.1.2 Public Key-Based AuthenticationĪmong public key-based authentication schemes, attribute-based encryption (ABE) and identity-based encryption (IBE) are the most common techniques.ĪBE achieves flexible one-to-many encryption based on attributes. ![]() We will present some explanations on OPE in the Appendix “Key terminology and definitions.” Therefore, in this section, we only focus on investigation of the comparison protocols without OPE. Those two matrices are sent to two different cloud servers, and the cloud servers can collaborate to complete extreme points detection.Īlthough OPE performs well in ciphertexts magnitude relation acquisition, it cannot easily process data in the ciphertext domain, and the processed data tend to lose significant magnitude relation. In his method, the images are split into two ciphertext matrices. Qin proposed a secure SIFT extraction method based on OPE. Therefore, OPE is a good tool for comparison protocol for CCS without trusty part. With OPE, the magnitude relation of ciphertexts can be easily obtained without additional comparison protocols. Order Preserving Encryption (OPE) is an encryption scheme, where the sort order of ciphertexts match the sort order of the corresponding plaintexts. Xingming Sun, in Advances in Computers, 2021 5.4 Order preserving encryption ĭecrypt (CT, PK, USK ⇢ M): It outputs plain text message M based on CT, PK, and the USK as input.KeyUpdate (USK, rk, δ ⇢ USK ′): It takes the input as USK and revocable attribute list δ and outputs the new modified user secret key USK′. It outputs the new ciphertext CT′ according to the attributes in δ and by using the revocable keys rk. ReEncrypt (CT, rk, δ ⇢ CT ′): It takes input as the CT, revocable attribute list δ, and the revocable keys rk. It returns the new public key PK′, new master secret key MSK′, and rekey rk. ![]() Get plain text from cypher text update#ReKeyGen ( δ, MSK ⇢ rk, PK ′, MSK ′): It takes attribute list δ contains the list of the attributes used for update andMSK as input.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |