Efficient subtree-based encryption for fuzzy-entity data sharing (Q1626290): Difference between revisions

From MaRDI portal
Set OpenAlex properties.
Import241208061232 (talk | contribs)
Normalize DOI.
 
(2 intermediate revisions by 2 users not shown)
Property / DOI
 
Property / DOI: 10.1007/s00500-017-2743-z / rank
Normal rank
 
Property / Wikidata QID
 
Property / Wikidata QID: Q122173434 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - EUROCRYPT 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology – CRYPTO 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4783728 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Identity-Based Encryption from the Weil Pairing / rank
 
Normal rank
Property / cites work
 
Property / cites work: Generalized Identity Based and Broadcast Encryption Schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Topics in Cryptology – CT-RSA 2005 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Hierarchical Identity Based Encryption with Constant Size Ciphertext / rank
 
Normal rank
Property / cites work
 
Property / cites work: Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4434880 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - EUROCRYPT 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fully, (Almost) Tightly Secure IBE and Dual System Groups / rank
 
Normal rank
Property / cites work
 
Property / cites work: An Identity Based Encryption Scheme Based on Quadratic Residues / rank
 
Normal rank
Property / cites work
 
Property / cites work: Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size Ciphertexts or Decryption Keys / rank
 
Normal rank
Property / cites work
 
Property / cites work: Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4341773 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Candidate Multilinear Maps from Ideal Lattices / rank
 
Normal rank
Property / cites work
 
Property / cites work: Practical Identity-Based Encryption Without Random Oracles / rank
 
Normal rank
Property / cites work
 
Property / cites work: Hierarchical Identity Based Encryption with Polynomially Many Levels / rank
 
Normal rank
Property / cites work
 
Property / cites work: Hierarchical ID-Based Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts) / rank
 
Normal rank
Property / cites work
 
Property / cites work: Trapdoors for hard lattices and new cryptographic constructions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4737264 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis of GGH Map / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cost-Effective Authentic and Anonymous Data Sharing with Forward Security / rank
 
Normal rank
Property / cites work
 
Property / cites work: New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts / rank
 
Normal rank
Property / cites work
 
Property / cites work: New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Hierarchical Identity-Based Broadcast Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4037493 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Provably secure threshold public-key encryption with adaptive security and short ciphertexts / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fully CCA2 secure identity based broadcast encryption without random oracles / rank
 
Normal rank
Property / cites work
 
Property / cites work: Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts / rank
 
Normal rank
Property / cites work
 
Property / cites work: Identity-Based Cryptosystems and Signature Schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Verifiable Auditing for Outsourced Database in Cloud Computing / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Identity-Based Encryption Without Random Oracles / rank
 
Normal rank
Property / cites work
 
Property / cites work: Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts / rank
 
Normal rank
Property / cites work
 
Property / cites work: Signatures in hierarchical certificateless cryptography: efficient constructions and provable security / rank
 
Normal rank
Property / cites work
 
Property / cites work: Anonymous spatial encryption under affine space delegation functionality with full security / rank
 
Normal rank
Property / DOI
 
Property / DOI: 10.1007/S00500-017-2743-Z / rank
 
Normal rank

Latest revision as of 23:32, 10 December 2024

scientific article
Language Label Description Also known as
English
Efficient subtree-based encryption for fuzzy-entity data sharing
scientific article

    Statements

    Efficient subtree-based encryption for fuzzy-entity data sharing (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    27 November 2018
    0 references
    subtree-based broadcast encryption
    0 references
    fuzzy-entity data sharing
    0 references
    provable security
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers