Content deleted Content added
→Further reading: Fix cite date error |
Citation bot (talk | contribs) Add: author pars. 1-1. Removed URL that duplicated unique identifier. Removed parameters. Some additions/deletions were actually parameter name changes. | You can use this bot yourself. Report bugs here. | Activated by AManWithNoPlan | All pages linked from User:AManWithNoPlan/sandbox2 | via #UCB_webform_linked |
||
Line 7:
== Types of attribute-based encryption schemes ==
There are mainly two types of attribute-based encryption schemes: Key-policy attribute-based encryption (KP-ABE)<ref name=":0" /> and ciphertext-policy attribute-based encryption (CP-ABE).<ref>{{Cite book|
In KP-ABE, users' secret keys are generated based on an access tree that defines the privileges scope of the concerned user, and data are encrypted over a set of attributes. However, CP-ABE uses access trees to encrypt data and users' secret keys are generated over a set of attributes.
Line 41:
==Further reading==
*{{Cite journal|
*Herranz, Javier; Laguillaumie, Fabien; Ràfols, Carla (2010), Nguyen, Phong Q.; Pointcheval, David (eds.), "[https://link.springer.com/chapter/10.1007/978-3-642-13013-7_2 Constant Size Ciphertexts in Threshold Attribute-Based Encryption]", ''Public Key Cryptography – PKC 2010'', Springer Berlin Heidelberg, 6056, pp. 19–34, [[Doi (identifier)|doi]]:[https://link.springer.com/chapter/10.1007/978-3-642-13013-7_2 10.1007/978-3-642-13013-7_2], [[ISBN (identifier)|ISBN]] [[Special:BookSources/978-3-642-13012-0|<bdi>978-3-642-13012-0</bdi>]], retrieved 2020-05-13
|