Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization

From MaRDI portal
Revision as of 21:48, 3 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:3084340

DOI10.1007/978-3-642-19379-8_4zbMath1291.94165OpenAlexW1510795740MaRDI QIDQ3084340

Brent Waters

Publication date: 15 March 2011

Published in: Public Key Cryptography – PKC 2011 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-19379-8_4




Related Items (only showing first 100 items - show all)

(Compact) Adaptively Secure FE for Attribute-Weighted Sums from k-LinQuantum attribute-based encryption: a comprehensive studyFully adaptive decentralized multi-authority \textsf{ABE}Hierarchical identity-based inner product functional encryptionA practical compiler for attribute-based encryption: new decentralized constructions and moreDecentralized multi-authority attribute-based inner-product FE: large universe and unboundedGLUE: generalizing unbounded attribute-based encryption for flexible efficiency trade-offs(Compact) adaptively secure FE for attribute-weighted sums from \(k\)-linElliptic curve cryptography; applications, challenges, recent advances, and future trends: a comprehensive surveyTinyABE: unrestricted ciphertext-policy attribute-based encryption for embedded devices and low-quality networksFully collusion resistant trace-and-revoke functional encryption for arbitrary identitiesTrapdoor sanitizable and redactable signatures with unlinkability, invisibility and strong context-hidingIdentity-based matchmaking encryption without random oraclesA survey on functional encryptionAdditive-homomorphic functional commitments and applications to homomorphic signaturesAchieving privacy-preserving sensitive attributes for large universe based on private set intersectionHierarchical and non-monotonic key-policy attribute-based encryption and its applicationCiphertext-policy attribute-based encryption for general circuits from bilinear mapsDual System Framework in Multilinear Settings and Applications to Fully Secure (Compact) ABE for Unbounded-Size CircuitsBounded-Collusion Attribute-Based Encryption from Minimal AssumptionsThe communication complexity of private simultaneous messages, revisitedMatch me if you can: matchmaking encryption and its applicationsA PROOF OF SECURITY FOR A KEY-POLICY RS-ABE SCHEMESelf-updatable encryption with short public parameters and its extensionsCryptanalysis of a CP-ABE scheme with policy in normal formsA bunch of broken schemes: a simple yet powerful linear approach to analyzing security of attribute-based encryptionUpslices, downslices, and secret-sharing with complexity of \(1.5^n\)Secret-sharing schemes for very dense graphsAttribute-Based EncryptionBlind attribute-based encryption and oblivious transfer with fine-grained access controlAn asymptotically perfect secret sharing scheme based on the Chinese Remainder TheoremFully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size CiphertextsPublic key encryption with distributed keyword searchCross-domain attribute-based access control encryptionAdaptive-secure identity-based inner-product functional encryption and its leakage-resilienceAdaptively secure laconic function evaluation for \(\mathsf{NC}^1\)On the security of joint signature and encryption revisitedA novel model for lattice-based authorized searchable encryption with special keywordABE with improved auxiliary input for big data securityA general framework for secure sharing of personal health records in cloud systemKey regeneration-free ciphertext-policy attribute-based encryption and its applicationBuilding a dynamic searchable encrypted medical database for multi-clientA survey of lattice based expressive attribute based encryptionPrivacy-preserving resource sharing using permissioned blockchains (the case of smart neighbourhood)Key-Policy Multi-authority Attribute-Based EncryptionEfficient Statically-Secure Large-Universe Multi-Authority Attribute-Based EncryptionCryptanalysis of Boyen's attribute-based encryption scheme in TCC 2013Dual System Encryption Framework in Prime-Order Groups via Computational Pair EncodingsDéjà Q All Over Again: Tighter and Broader Reductions of q-Type AssumptionsSystematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practiceSpatial encryption supporting non-monotone access structureAccountable Ciphertext-Policy Attribute-Based Encryption Scheme Supporting Public Verifiability and NonrepudiationAn Efficient and Expressive Ciphertext-Policy Attribute-Based Encryption Scheme with Partially Hidden Access StructuresCiphertext-Policy Attribute Based Encryption Supporting Access Policy UpdateFully secure revocable attribute-based encryptionAttribute-based encryption schemes with constant-size ciphertextsKey-policy attribute-based encryption against continual auxiliary input leakageAccountable CP-ABE with Public Verifiability: How to Effectively Protect the Outsourced Data in CloudVerifiable outsourced ciphertext-policy attribute-based encryption in cloud computingDecentralized multi-authority ABE for \(\mathsf{NC}^1\) from BDHAccountable authority key policy attribute-based encryptionA new technique for compacting ciphertext in multi-channel broadcast encryption and attribute-based encryptionAttribute-based optimistic fair exchange: how to restrict brokers with policiesImproved inner-product encryption with adaptive security and full attribute-hidingHierarchical attribute based encryption with continuous leakage-resilienceExpanded Framework for Dual System Encryption and Its ApplicationAn efficient key-policy attribute-based encryption scheme with constant ciphertext lengthDistributed Multi-authority Attribute-Based Encryption Using Cellular AutomataEfficient anonymous multi-group broadcast encryptionExtremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verificationSecret-Sharing Schemes: A SurveyCost-Effective and Scalable Data Sharing in Cloud Storage Using Hierarchical Attribute-Based Encryption with Forward SecurityAdaptable key-policy attribute-based encryption with time intervalAn efficient attribute-based access control system with break-glass capability for cloud-assisted industrial control systemSecurity and efficiency data sharing scheme for cloud storageSelf-updatable encryption: time constrained access control with hidden attributes and better efficiencyComputational friendly attribute-based encryptions with short ciphertextVerifiability-based conversion from CPA to CCA-secure predicate encryptionResearch on ciphertext-policy attribute-based encryption with attribute level user revocation in cloud storageDoubly spatial encryption from DBDHAttribute-Based Encryption with Fast DecryptionPublicly verifiable searchable symmetric encryption based on efficient cryptographic componentsDirectly revocable key-policy attribute-based encryption with verifiable ciphertext delegationFully secure functional encryption with a large class of relations from the decisional linear assumptionExtensions of access structures and their cryptographic applicationsDuality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational EncodingsPractical Ciphertext-Policy Attribute-Based Encryption: Traitor Tracing, Revocation, and Large UniverseBandwidth-efficient attribute-based key-insulated signatures with message recoveryAn expressive and provably secure ciphertext-policy attribute-based encryptionCiphertext-policy hierarchical attribute-based encryption with short ciphertextsCompacting ciphertext in multi-channel broadcast encryption and attribute-based encryptionPractical Techniques Building on Encryption for Protecting and Managing Data in the CloudSEMD: secure and efficient message dissemination with policy enforcement in VANETAttribute-based fuzzy identity access control in multicloud computing environmentsExpressive attribute-based keyword search with constant-size ciphertextSecure independent-update concise-expression access control for video on demand in cloudPrivacy-preserving attribute-keyword based data publish-subscribe service on cloud platformsForgeability of Wang-Zhu-Feng-Yau's attribute-based signature with policy-and-endorsement mechanismAn LWE-based verifiable threshold secret sharing schemeSecure and Traceable Framework for Data Circulation







This page was built for publication: Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization