cuits from secret sharing and multi-linear maps. In
Pasalic, E. and Knudsen, L. R., editors, Cryptography
and Information Security in the Balkans: Second In-
ternational Conference, BalkanCryptSec 2015, Koper,
Slovenia, September 3-4, 2015, Revised Selected Pa-
pers, pages 112–133. Springer International Publish-
ing.
Dr
˘
agan, C. C. and ¸Tiplea, F. L. (2018). On the asymptotic
idealness of the Asmuth-Bloom threshold secret shar-
ing scheme. Information Sciences, 463 - 464:75 – 85.
Garg, S., Gentry, C., Halevi, S., Sahai, A., and Waters, B.
(2013). Attribute-based encryption for circuits from
multilinear maps. In Canetti, R. and Garay, J., editors,
Advances in Cryptology – CRYPTO 2013, volume
8043 of Lecture Notes in Computer Science, pages
479–499. Springer Berlin Heidelberg.
Ghodosi, H., Pieprzyk, J., and Safavi-Naini, R. (1998). Se-
cret sharing in multilevel and compartmented groups.
In Boyd, C. and Dawson, E., editors, Third Aus-
tralasian Conference on Information Security and Pri-
vacy (ACISP ’98), volume 1438 of Lecture Notes in
Computer Science, pages 367–378. Springer.
Goyal, V., Pandey, O., Sahai, A., and Waters, B. (2006).
Attribute-based encryption for fine-grained access
control of encypted data. In ACM Conference on
Computer and Communications Security, pages 89–
98. ACM.
Green, M., Hohenberger, S., and Waters, B. (2011). Out-
sourcing the decryption of abe ciphertexts. In Pro-
ceedings of the 20th USENIX Conference on Security,
SEC’11, page 34, USA. USENIX Association.
Hyla, T., Pejas, J., Fray, I. E., Macków, W., Chocianowicz,
W., and Szulga, M. (2014). Sensitive information pro-
tection on mobile devices using general access struc-
tures. In ICONS 2014.
Jakóbczyk, M. T. (2020). Practical Oracle Cloud Infras-
tructure: Infrastructure as a Service, Autonomous
Database, Managed Kubernetes, and Serverless.
Apress, 1 edition.
Kaaniche, N. and Laurent, M. (2017). Attribute based en-
cryption for multi-level access control policies. In
Proceedings of the 14th International Joint Confer-
ence on e-Business and Telecommunications - Volume
4: SECRYPT, (ICETE 2017), pages 67–78. INSTICC,
SciTePress.
Kaaniche, N. and Laurent, M. (2018). SABE: A selective
attribute-based encryption for an efficient threshold
multi-level access control. In Samarati, P. and Obai-
dat, M. S., editors, Proceedings of the 15th Interna-
tional Joint Conference on e-Business and Telecom-
munications, ICETE 2018 - Volume 2: SECRYPT,
Porto, Portugal, July 26-28, 2018, pages 321–333.
SciTePress.
Li, J., Lin, X., Zhang, Y., and Han, J. (2016). KSF-OABE:
outsourced attribute-based encryption with keyword
search function for cloud storage. IEEE Transactions
on Services Computing, 10(5):715–725.
Li, Zhao and Huan, Shuiyuan (2018). Multi-level attribute-
based encryption access control scheme for big data.
MATEC Web Conf., 173:03047.
Liao, Y., Zhang, G., and Chen, H. (2020). Cost-efficient
outsourced decryption of attribute-based encryption
schemes for both users and cloud server in green cloud
computing. IEEE Access, 8:20862–20869.
Lynn, B. (2007). PBC library. https://crypto.stanford.edu/
pbc/.
Pramanik, J., Roy, P. S., Dutta, S., Adhikari, A., and Saku-
rai, K. (2018). Secret sharing schemes on compart-
mental access structure in presence of cheaters. In
Proceedings of the International Conference on Infor-
mation Systems Security, pages 171–188.
Qin, B., Deng, R. H., Liu, S., and Ma, S. (2015). Attribute-
based encryption with efficient verifiable outsourced
decryption. IEEE Transactions on Information Foren-
sics and Security, 10(7):1384–1393.
Simmons, G. J. (1988). How to (really) share a secret.
In Goldwasser, S., editor, 8th Annual International
Cryptology Conference on Advances in Cryptology
(CRYPT ’88), volume 403 of Lecture Notes in Com-
puter Science, pages 390–448. Springer.
Stinson, D. (2005). Cryptography: Theory and Practice.
Chapman and Hall/CRC, 3 edition.
Tassa, T. (2007). Hierarchical threshold secret sharing.
Journal of Cryptology, 20(2):237–264.
Tassa, T. and Dyn, N. (2008). Multipartite secret shar-
ing by bivariate interpolation. Journal of Cryptology,
22(2):227–258.
Touati, L. and Challal, Y. (2016). Collaborative KP-ABE
for cloud-based Internet of things applications. In
2016 IEEE International Conference on Communica-
tions (ICC), pages 1–7.
Wang, S., Guo, K., and Zhang, Y. (2018). Traceable
ciphertext-policy attribute-based encryption scheme
with attribute level user revocation for cloud storage.
PLOS ONE, 13(9):1–23.
Wang, S., Zhao, D., and Zhang, Y. (2017). Searchable
attribute-based encryption scheme with attribute revo-
cation in cloud storage. PLOS ONE, 12(8):1–20.
Yu, J., Ren, K., and Wang, C. (2016). Enabling cloud stor-
age auditing with verifiable outsourcing of key up-
dates. IEEE transactions on information forensics and
security, 11(6):1362–1375.
Yu, S., Wang, C., Ren, K., and Lou, W. (2010). Achieving
secure, scalable, and fine-grained data access control
in cloud computing. In 2010 Proceedings IEEE IN-
FOCOM, pages 1–9.
Yu, Y. and Wang, M. (2011). A probabilistic secret shar-
ing scheme for a compartmented access structure. In
Qing, S., Susilo, W., Wang, G., and Liu, D., editors,
Information and Communications Security - 13th In-
ternational Conference, ICICS 2011, Beijing, China,
November 23-26, 2011. Proceedings, volume 7043 of
Lecture Notes in Computer Science, pages 136–142.
Springer.
SECRYPT 2020 - 17th International Conference on Security and Cryptography
212