Efficient subtree-based encryption for fuzzy-entity data sharing
From MaRDI portal
Recommendations
- Functional broadcast encryption with applications to data sharing for cloud storage
- A secure cloud data sharing scheme from identity-based proxy re-encryption
- New fuzzy identity-based encryption in the standard model
- An identity-based encryption technique using subtree for fuzzy user data sharing under cloud computing environment
- Cost-effective and scalable data sharing in cloud storage using hierarchical attribute-based encryption with forward security
Cites work
- scientific article; zbMATH DE number 177614 (Why is no real title available?)
- scientific article; zbMATH DE number 1024079 (Why is no real title available?)
- scientific article; zbMATH DE number 2009960 (Why is no real title available?)
- scientific article; zbMATH DE number 2086725 (Why is no real title available?)
- scientific article; zbMATH DE number 1842494 (Why is no real title available?)
- Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts)
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology – CRYPTO 2004
- An Identity Based Encryption Scheme Based on Quadratic Residues
- Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts
- Anonymous broadcast encryption: adaptive security and efficient constructions in the standard model
- Anonymous spatial encryption under affine space delegation functionality with full security
- Candidate Multilinear Maps from Ideal Lattices
- Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts
- Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys
- Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts
- Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
- Cryptanalysis of GGH map
- Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
- Efficient Identity-Based Encryption Without Random Oracles
- Fully CCA2 secure identity based broadcast encryption without random oracles
- Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size Ciphertexts or Decryption Keys
- Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption
- Fully, (Almost) Tightly Secure IBE and Dual System Groups
- Generalized Identity Based and Broadcast Encryption Schemes
- Hierarchical ID-Based Cryptography
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- Hierarchical Identity Based Encryption with Polynomially Many Levels
- Hierarchical Identity-Based Broadcast Encryption
- Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys
- Identity-Based Encryption from the Weil Pairing
- Identity-based cryptosystems and signature schemes
- New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
- New proof methods for attribute-based encryption: achieving full security through selective techniques
- Practical Identity-Based Encryption Without Random Oracles
- Provably secure threshold public-key encryption with adaptive security and short ciphertexts
- Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions
- Signatures in hierarchical certificateless cryptography: efficient constructions and provable security
- Topics in Cryptology – CT-RSA 2005
- Trapdoors for hard lattices and new cryptographic constructions
- Verifiable Auditing for Outsourced Database in Cloud Computing
Cited in
(4)- An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem
- An identity-based encryption technique using subtree for fuzzy user data sharing under cloud computing environment
- Functional broadcast encryption with applications to data sharing for cloud storage
- scientific article; zbMATH DE number 2133056 (Why is no real title available?)
This page was built for publication: Efficient subtree-based encryption for fuzzy-entity data sharing
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1626290)