Delegating Capabilities in Predicate Encryption Systems
From MaRDI portal
Publication:3519533
DOI10.1007/978-3-540-70583-3_46zbMath1155.94385OpenAlexW1534176767MaRDI QIDQ3519533
Publication date: 19 August 2008
Published in: Automata, Languages and Programming (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-70583-3_46
Related Items (22)
Adaptive-secure identity-based inner-product functional encryption and its leakage-resilience ⋮ Revocable hierarchical identity-based encryption with shorter private keys and update keys ⋮ Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption ⋮ A survey on functional encryption ⋮ Improved hidden vector encryption with short ciphertexts and tokens ⋮ The relation and transformation between hierarchical inner product encryption and spatial encryption ⋮ Transforming Hidden Vector Encryption Schemes from Composite to Prime Order Groups ⋮ Efficient selective identity-based encryption without random oracles ⋮ Anonymous spatial encryption under affine space delegation functionality with full security ⋮ Self-updatable encryption: time constrained access control with hidden attributes and better efficiency ⋮ Identity-based encryption with outsourced equality test in cloud computing ⋮ Anonymous HIBE with short ciphertexts: full security in prime order groups ⋮ Fully secure functional encryption with a large class of relations from the decisional linear assumption ⋮ Delegation-based conversion from CPA to CCA-secure predicate encryption ⋮ Anonymous attribute-based broadcast encryption with hidden multiple access structures ⋮ Match me if you can: matchmaking encryption and its applications ⋮ Tightly secure hierarchical identity-based encryption ⋮ Anonymous Encryption with Partial-Order Subset Delegation Functionality ⋮ Master-key KDM-secure ABE via predicate encoding ⋮ Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application to Searchable Encryption in Multi-user Setting ⋮ New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts ⋮ Compact hierarchical identity-based encryption based on a harder decisional problem
This page was built for publication: Delegating Capabilities in Predicate Encryption Systems