Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization
From MaRDI portal
Publication:3084340
DOI10.1007/978-3-642-19379-8_4zbMath1291.94165OpenAlexW1510795740MaRDI QIDQ3084340
Publication date: 15 March 2011
Published in: Public Key Cryptography – PKC 2011 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-19379-8_4
Related Items (only showing first 100 items - show all)
(Compact) Adaptively Secure FE for Attribute-Weighted Sums from k-Lin ⋮ Quantum attribute-based encryption: a comprehensive study ⋮ Fully adaptive decentralized multi-authority \textsf{ABE} ⋮ Hierarchical identity-based inner product functional encryption ⋮ A practical compiler for attribute-based encryption: new decentralized constructions and more ⋮ Decentralized multi-authority attribute-based inner-product FE: large universe and unbounded ⋮ GLUE: generalizing unbounded attribute-based encryption for flexible efficiency trade-offs ⋮ (Compact) adaptively secure FE for attribute-weighted sums from \(k\)-lin ⋮ Elliptic curve cryptography; applications, challenges, recent advances, and future trends: a comprehensive survey ⋮ TinyABE: unrestricted ciphertext-policy attribute-based encryption for embedded devices and low-quality networks ⋮ Fully collusion resistant trace-and-revoke functional encryption for arbitrary identities ⋮ Trapdoor sanitizable and redactable signatures with unlinkability, invisibility and strong context-hiding ⋮ Identity-based matchmaking encryption without random oracles ⋮ A survey on functional encryption ⋮ Additive-homomorphic functional commitments and applications to homomorphic signatures ⋮ Achieving privacy-preserving sensitive attributes for large universe based on private set intersection ⋮ Hierarchical and non-monotonic key-policy attribute-based encryption and its application ⋮ Ciphertext-policy attribute-based encryption for general circuits from bilinear maps ⋮ Dual System Framework in Multilinear Settings and Applications to Fully Secure (Compact) ABE for Unbounded-Size Circuits ⋮ Bounded-Collusion Attribute-Based Encryption from Minimal Assumptions ⋮ The communication complexity of private simultaneous messages, revisited ⋮ Match me if you can: matchmaking encryption and its applications ⋮ A PROOF OF SECURITY FOR A KEY-POLICY RS-ABE SCHEME ⋮ Self-updatable encryption with short public parameters and its extensions ⋮ Cryptanalysis of a CP-ABE scheme with policy in normal forms ⋮ A bunch of broken schemes: a simple yet powerful linear approach to analyzing security of attribute-based encryption ⋮ Upslices, downslices, and secret-sharing with complexity of \(1.5^n\) ⋮ Secret-sharing schemes for very dense graphs ⋮ Attribute-Based Encryption ⋮ Blind attribute-based encryption and oblivious transfer with fine-grained access control ⋮ An asymptotically perfect secret sharing scheme based on the Chinese Remainder Theorem ⋮ Fully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size Ciphertexts ⋮ Public key encryption with distributed keyword search ⋮ Cross-domain attribute-based access control encryption ⋮ Adaptive-secure identity-based inner-product functional encryption and its leakage-resilience ⋮ Adaptively secure laconic function evaluation for \(\mathsf{NC}^1\) ⋮ On the security of joint signature and encryption revisited ⋮ A novel model for lattice-based authorized searchable encryption with special keyword ⋮ ABE with improved auxiliary input for big data security ⋮ A general framework for secure sharing of personal health records in cloud system ⋮ Key regeneration-free ciphertext-policy attribute-based encryption and its application ⋮ Building a dynamic searchable encrypted medical database for multi-client ⋮ A survey of lattice based expressive attribute based encryption ⋮ Privacy-preserving resource sharing using permissioned blockchains (the case of smart neighbourhood) ⋮ Key-Policy Multi-authority Attribute-Based Encryption ⋮ Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption ⋮ Cryptanalysis of Boyen's attribute-based encryption scheme in TCC 2013 ⋮ Dual System Encryption Framework in Prime-Order Groups via Computational Pair Encodings ⋮ Déjà Q All Over Again: Tighter and Broader Reductions of q-Type Assumptions ⋮ Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice ⋮ Spatial encryption supporting non-monotone access structure ⋮ Accountable Ciphertext-Policy Attribute-Based Encryption Scheme Supporting Public Verifiability and Nonrepudiation ⋮ An Efficient and Expressive Ciphertext-Policy Attribute-Based Encryption Scheme with Partially Hidden Access Structures ⋮ Ciphertext-Policy Attribute Based Encryption Supporting Access Policy Update ⋮ Fully secure revocable attribute-based encryption ⋮ Attribute-based encryption schemes with constant-size ciphertexts ⋮ Key-policy attribute-based encryption against continual auxiliary input leakage ⋮ Accountable CP-ABE with Public Verifiability: How to Effectively Protect the Outsourced Data in Cloud ⋮ Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing ⋮ Decentralized multi-authority ABE for \(\mathsf{NC}^1\) from BDH ⋮ Accountable authority key policy attribute-based encryption ⋮ A new technique for compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption ⋮ Attribute-based optimistic fair exchange: how to restrict brokers with policies ⋮ Improved inner-product encryption with adaptive security and full attribute-hiding ⋮ Hierarchical attribute based encryption with continuous leakage-resilience ⋮ Expanded Framework for Dual System Encryption and Its Application ⋮ An efficient key-policy attribute-based encryption scheme with constant ciphertext length ⋮ Distributed Multi-authority Attribute-Based Encryption Using Cellular Automata ⋮ Efficient anonymous multi-group broadcast encryption ⋮ Extremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verification ⋮ Secret-Sharing Schemes: A Survey ⋮ Cost-Effective and Scalable Data Sharing in Cloud Storage Using Hierarchical Attribute-Based Encryption with Forward Security ⋮ Adaptable key-policy attribute-based encryption with time interval ⋮ An efficient attribute-based access control system with break-glass capability for cloud-assisted industrial control system ⋮ Security and efficiency data sharing scheme for cloud storage ⋮ Self-updatable encryption: time constrained access control with hidden attributes and better efficiency ⋮ Computational friendly attribute-based encryptions with short ciphertext ⋮ Verifiability-based conversion from CPA to CCA-secure predicate encryption ⋮ Research on ciphertext-policy attribute-based encryption with attribute level user revocation in cloud storage ⋮ Doubly spatial encryption from DBDH ⋮ Attribute-Based Encryption with Fast Decryption ⋮ Publicly verifiable searchable symmetric encryption based on efficient cryptographic components ⋮ Directly revocable key-policy attribute-based encryption with verifiable ciphertext delegation ⋮ Fully secure functional encryption with a large class of relations from the decisional linear assumption ⋮ Extensions of access structures and their cryptographic applications ⋮ Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings ⋮ Practical Ciphertext-Policy Attribute-Based Encryption: Traitor Tracing, Revocation, and Large Universe ⋮ Bandwidth-efficient attribute-based key-insulated signatures with message recovery ⋮ An expressive and provably secure ciphertext-policy attribute-based encryption ⋮ Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts ⋮ Compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption ⋮ Practical Techniques Building on Encryption for Protecting and Managing Data in the Cloud ⋮ SEMD: secure and efficient message dissemination with policy enforcement in VANET ⋮ Attribute-based fuzzy identity access control in multicloud computing environments ⋮ Expressive attribute-based keyword search with constant-size ciphertext ⋮ Secure independent-update concise-expression access control for video on demand in cloud ⋮ Privacy-preserving attribute-keyword based data publish-subscribe service on cloud platforms ⋮ Forgeability of Wang-Zhu-Feng-Yau's attribute-based signature with policy-and-endorsement mechanism ⋮ An LWE-based verifiable threshold secret sharing scheme ⋮ Secure and Traceable Framework for Data Circulation
This page was built for publication: Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization