Attribute-based encryption schemes with constant-size ciphertexts
From MaRDI portal
Recommendations
- Expressive key-policy attribute-based encryption with constant-size ciphertexts
- Efficient ciphertext policy attribute-based encryption with constant-size ciphertext and constant computation-cost
- Constant size ciphertexts in threshold attribute-based encryption
- Computationally efficient expressive key-policy attribute based encryption schemes with constant-size ciphertext
- Computational friendly attribute-based encryptions with short ciphertext
Cites work
- scientific article; zbMATH DE number 2009960 (Why is no real title available?)
- scientific article; zbMATH DE number 1759344 (Why is no real title available?)
- A ciphertext-policy attribute-based encryption scheme with constant ciphertext length
- Advances in Cryptology - CRYPTO 2003
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology – CRYPTO 2004
- Bounded Ciphertext Policy Attribute Based Encryption
- Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization
- Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys
- Conjunctive Broadcast and Attribute-Based Encryption
- Constant size ciphertexts in threshold attribute-based encryption
- Dynamic Threshold Public-Key Encryption
- Expressive key-policy attribute-based encryption with constant-size ciphertexts
- Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size Ciphertexts or Decryption Keys
- Fully secure functional encryption with general relations from the decisional linear assumption
- Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption
- Functional encryption for inner product: achieving constant-size ciphertexts with adaptive security or support for negation
- Functional encryption: definitions and challenges
- Fuzzy Identity-Based Encryption
- General Ad Hoc Encryption from Exponent Inversion IBE
- Generalized Identity Based and Broadcast Encryption Schemes
- Generic constructions for chosen-ciphertext secure attribute based encryption
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- Identity-Based Encryption from the Weil Pairing
- Identity-based cryptosystems and signature schemes
- Multi-authority Attribute Based Encryption
- Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products
- Security Analysis of the Strong Diffie-Hellman Problem
Cited in
(44)- New techniques for traitor tracing: size \(N^{1/3}\) and more from pairings
- Constant size ciphertexts in threshold attribute-based encryption
- Ciphertext-policy attribute based encryption supporting access policy update
- Cryptanalysis of a CP-ABE scheme with policy in normal forms
- A ciphertext-policy attribute-based encryption scheme with constant ciphertext length
- Revocable attribute-based encryption with decryption key exposure resistance and ciphertext delegation
- Reducing the CRS size in registered ABE systems
- Key-policy multi-authority attribute-based encryption
- Attribute-based encryption schemes
- Constant decryption-cost non-monotonic ciphertext policy attribute-based encryption with reduced secret key size (and dynamic attributes)
- Efficient Hidden Vector Encryption with Constant-Size Ciphertext
- Security-level switchable attribute-based encryption under the strictly weaker assumption family
- Conjunctive Broadcast and Attribute-Based Encryption
- Attribute based broadcast encryption with short ciphertext and decryption key
- Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes
- New results and applications for multi-secret sharing schemes
- Attribute-based encryption with fast decryption
- Generic conversions from CPA to CCA without ciphertext expansion for threshold ABE with constant-size ciphertexts
- Efficient ciphertext policy attribute-based encryption with constant-size ciphertext and constant computation-cost
- Cryptanalysis of Boyen's attribute-based encryption scheme in TCC 2013
- Fast, compact, and expressive attribute-based encryption
- A framework and compact constructions for non-monotonic attribute-based encryption
- Threshold Ciphertext Policy Attribute-Based Encryption with Constant Size Ciphertexts
- Computationally efficient ciphertext-policy attribute-based encryption with constant-size ciphertexts
- Attribute-based encryption for range attributes
- Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice
- Efficient fully secure attribute-based encryption schemes for general access structures
- Bandwidth-efficient attribute-based key-insulated signatures with message recovery
- Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings
- Efficient ciphertext-policy attribute-based encryption with blackbox traceability
- Compact NIZKs from standard assumptions on bilinear maps
- A new technique for compacting secret key in attribute-based broadcast encryption
- Attribute-based encryption
- Computationally efficient expressive key-policy attribute based encryption schemes with constant-size ciphertext
- Expressive key-policy attribute-based encryption with constant-size ciphertexts
- Mitigating the one-use restriction in attribute-based encryption
- Expressive attribute-based encryption with constant-size ciphertexts from the decisional linear assumption
- Computational friendly attribute-based encryptions with short ciphertext
- Expressive Attribute Based Signcryption with Constant-Size Ciphertext
- A survey on functional encryption
- Succinct multi-authority attribute-based access control for circuits with authenticated outsourcing
- An efficient key-policy attribute-based encryption scheme with constant ciphertext length
- Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization
- Fully secure attribute-based systems with short ciphertexts/signatures and threshold access structures
This page was built for publication: Attribute-based encryption schemes with constant-size ciphertexts
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q417988)