Secure threshold multi authority attribute based encryption without a central authority
From MaRDI portal
Publication:985083
DOI10.1016/j.ins.2010.03.004zbMath1191.94095OpenAlexW1983238288WikidataQ122421042 ScholiaQ122421042MaRDI QIDQ985083
Huang Lin, Jun Shao, Xiao-Hui Liang, Zhen Fu Cao
Publication date: 20 July 2010
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2010.03.004
Related Items (8)
Key-Policy Multi-authority Attribute-Based Encryption ⋮ A survey on functional encryption ⋮ Hierarchical and non-monotonic key-policy attribute-based encryption and its application ⋮ Fine-grained searchable encryption in multi-user setting ⋮ Directly revocable key-policy attribute-based encryption with verifiable ciphertext delegation ⋮ Bandwidth-efficient attribute-based key-insulated signatures with message recovery ⋮ Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts ⋮ Secure Threshold Multi Authority Attribute Based Encryption without a Central Authority
Cites Work
- Unnamed Item
- Unnamed Item
- Security weakness in a three-party pairing-based protocol for password authenticated key exchange
- Secure distributed key generation for discrete-log based cryptosystems
- A secure identity-based proxy multi-signature scheme
- An improved identity-based key agreement protocol and its security proof
- Robust threshold DSS signatures
- A novel ID-based designated verifier signature scheme
- Identity-Based Cryptosystems and Signature Schemes
- Bounded Ciphertext Policy Attribute Based Encryption
- Multi-authority Attribute Based Encryption
- Fuzzy Identity-Based Encryption
This page was built for publication: Secure threshold multi authority attribute based encryption without a central authority