Skip to Content
Big Data
book

Big Data

by Fei Hu
April 2016
Beginner to intermediate
463 pages
18h 53m
English
Auerbach Publications
Content preview from Big Data
Cryptography for Big Data Security
251
decrypt data for which neither of their keys individually satisfies the access formula. This is typ-
ically the hardest feature of ABE to achieve and requires stronger cryptographic assumptions.
10.3.2.3 Survey
10.3.2.3.1 A first attempt
As a first attempt to constructing ABE, we can do the following. Let each cryptographic key
correspond to an attribute, so k
A
is given to all users with attribute A. Now, to encrypt a piece of
data so that only those possessing attributes A and B can decrypt, we can encrypt the data first
under k
A
and then under k
B
, resulting in c = Enc
k
B
(Enc
k
A
(x)). Clearly, both keys are needed
to
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Big Data

Big Data

Bernard Marr
Big Data

Big Data

Kuan-Ching Li, Hai Jiang, Laurence T. Yang, Alfredo Cuzzocrea
Big Data

Big Data

Eglantine Schmitt
Big Data

Big Data

James Warren, Nathan Marz

Publisher Resources

ISBN: 9781498734875