Accountable authority key policy attribute-based encryption
From MaRDI portal
Recommendations
- Making \textit{any} attribute-based encryption accountable, efficiently
- Privacy-Aware Attribute-Based Encryption with User Accountability
- Key-policy ABE with switchable attributes
- Key-policy attribute-based encryption scheme for general circuits
- Accountable ciphertext-policy attribute-based encryption scheme supporting public verifiability and nonrepudiation
Cites work
- scientific article; zbMATH DE number 176545 (Why is no real title available?)
- scientific article; zbMATH DE number 708798 (Why is no real title available?)
- scientific article; zbMATH DE number 1842494 (Why is no real title available?)
- CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption
- Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization
- Conjunctive Broadcast and Attribute-Based Encryption
- Defending against key abuse attacks in KP-ABE enabled broadcast systems
- Efficient Identity-Based Encryption Without Random Oracles
- Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption
- Fuzzy Identity-Based Encryption
- Identity-based cryptosystems and signature schemes
- Practical Identity-Based Encryption Without Random Oracles
- Reducing Trust in the PKG in Identity Based Cryptosystems
- Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys
- Traceable and Retrievable Identity-Based Encryption
Cited in
(9)- scientific article; zbMATH DE number 6402469 (Why is no real title available?)
- A proof of security for a key-policy RS-ABE scheme
- Privacy-Aware Attribute-Based Encryption with User Accountability
- Making \textit{any} attribute-based encryption accountable, efficiently
- Accountable Authority Identity-Based Encryption with Public Traceability
- Key-policy ABE with switchable attributes
- Towards secure data retrieval for multi-tenant architecture using attribute-based key word search
- Key-policy attribute-based encryption against continual auxiliary input leakage
- A generic construction of accountable decryption and its applications
This page was built for publication: Accountable authority key policy attribute-based encryption
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q439851)