Delegating Capabilities in Predicate Encryption Systems

From MaRDI portal
Revision as of 00:50, 5 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:3519533

DOI10.1007/978-3-540-70583-3_46zbMath1155.94385OpenAlexW1534176767MaRDI QIDQ3519533

Elaine Shi, Brent Waters

Publication date: 19 August 2008

Published in: Automata, Languages and Programming (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-540-70583-3_46






Related Items (22)

Adaptive-secure identity-based inner-product functional encryption and its leakage-resilienceRevocable hierarchical identity-based encryption with shorter private keys and update keysEfficient Statically-Secure Large-Universe Multi-Authority Attribute-Based EncryptionA survey on functional encryptionImproved hidden vector encryption with short ciphertexts and tokensThe relation and transformation between hierarchical inner product encryption and spatial encryptionTransforming Hidden Vector Encryption Schemes from Composite to Prime Order GroupsEfficient selective identity-based encryption without random oraclesAnonymous spatial encryption under affine space delegation functionality with full securitySelf-updatable encryption: time constrained access control with hidden attributes and better efficiencyIdentity-based encryption with outsourced equality test in cloud computingAnonymous HIBE with short ciphertexts: full security in prime order groupsFully secure functional encryption with a large class of relations from the decisional linear assumptionDelegation-based conversion from CPA to CCA-secure predicate encryptionAnonymous attribute-based broadcast encryption with hidden multiple access structuresMatch me if you can: matchmaking encryption and its applicationsTightly secure hierarchical identity-based encryptionAnonymous Encryption with Partial-Order Subset Delegation FunctionalityMaster-key KDM-secure ABE via predicate encodingCiphertext-Policy Delegatable Hidden Vector Encryption and Its Application to Searchable Encryption in Multi-user SettingNew Techniques for Dual System Encryption and Fully Secure HIBE with Short CiphertextsCompact hierarchical identity-based encryption based on a harder decisional problem







This page was built for publication: Delegating Capabilities in Predicate Encryption Systems