Access Control Encryption: Enforcing Information Flow with Cryptography
From MaRDI portal
Publication:3181040
DOI10.1007/978-3-662-53644-5_21zbMath1400.94138arXiv1602.03642OpenAlexW2263777827MaRDI QIDQ3181040
Claudio Orlandi, Helene Haagh, Ivan B. Damgård
Publication date: 22 December 2016
Published in: Theory of Cryptography (Search for Journal in Brave)
Full work available at URL: https://arxiv.org/abs/1602.03642
Related Items
Access Control Encryption: Enforcing Information Flow with Cryptography, Cross-domain attribute-based access control encryption, Vetted encryption, Unlinkable policy-based sanitizable signatures, Structure-preserving signatures on equivalence classes and constant-size anonymous credentials, On access control encryption without sanitization, Access control encryption with efficient verifiable sanitized decryption, Policy-compliant signatures, Public key based searchable encryption with fine-grained sender permission control, Access Control Encryption for Equality, Comparison, and More, ACE with Compact Ciphertext Size and Decentralized Sanitizers, Match me if you can: matchmaking encryption and its applications, An efficient CCA-secure access control encryption for any policy, Access control encryption from group encryption
Cites Work
- Unnamed Item
- Predicate encryption supporting disjunctions, polynomial equations, and inner products
- Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits
- Message Transmission with Reverse Firewalls—Secure Communication on Corrupted Machines
- Cryptographic Reverse Firewalls
- Functional Encryption: Definitions and Challenges
- Access Control Encryption: Enforcing Information Flow with Cryptography
- Rerandomizable RCCA Encryption
- A public key cryptosystem and a signature scheme based on discrete logarithms
- Topics in Cryptology – CT-RSA 2004