Fully secure ABE with outsourced decryption against chosen ciphertext attack
From MaRDI portal
Publication:2057133
DOI10.1007/978-3-030-71852-7_6zbMath1479.94266OpenAlexW3138213699MaRDI QIDQ2057133
Yongbin Zhou, Ti Wang, Hui Ma, Rui Zhang, Yuejun Liu
Publication date: 8 December 2021
Full work available at URL: https://doi.org/10.1007/978-3-030-71852-7_6
Uses Software
Cites Work
- Unnamed Item
- An algebraic framework for Diffie-Hellman assumptions
- Securing threshold cryptosystems against chosen ciphertext attack
- Unbounded ABE via bilinear entropy expansion, revisited
- Secure integration of asymmetric and symmetric encryption schemes
- Compact adaptively secure ABE from \(k\)-Lin: beyond \(\mathsf{NC}^1\) and towards \(\mathsf{NL} \)
- Adaptively secure ABE for DFA from \(k\)-Lin and more
- Compact adaptively secure ABE for \(\mathrm{NC}^1\) from \(k\)-lin
- Chosen Ciphertext Secure Attribute-Based Encryption with Outsourced Decryption
- New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques
- Improved Dual System ABE in Prime-Order Groups via Predicate Encodings
- Unbounded HIBE and Attribute-Based Encryption
- Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization
- Generic Constructions for Chosen-Ciphertext Secure Attribute Based Encryption
- Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts
- Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
- New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
- Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems
- Advances in Cryptology - EUROCRYPT 2004
- Fuzzy Identity-Based Encryption
- Advances in Cryptology - CRYPTO 2003
This page was built for publication: Fully secure ABE with outsourced decryption against chosen ciphertext attack