Access control encryption from group encryption
From MaRDI portal
Publication:2117042
DOI10.1007/978-3-030-78372-3_16zbMATH Open1491.94071OpenAlexW3168341498MaRDI QIDQ2117042FDOQ2117042
Authors: Xiu-Hua Wang, Harry W. H. Wong, Sherman S. M. Chow
Publication date: 21 March 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-78372-3_16
Recommendations
- Strengthening access control encryption
- Access Control Encryption for Equality, Comparison, and More
- Access control encryption with efficient verifiable sanitized decryption
- Access control encryption for general policies from standard assumptions
- Access control encryption: enforcing information flow with cryptography
chosen-ciphertext securitytraceabilitypost-quantum securitygroup encryptionlattice-based encryptionlearning with erroraccess control encryptionsanitization
Cites Work
- On lattices, learning with errors, random linear codes, and cryptography
- Functional encryption: definitions and challenges
- Group encryption: non-interactive realization in the standard model
- Real traceable signatures
- Advances in Cryptology - EUROCRYPT 2004
- Access Control Encryption: Enforcing Information Flow with Cryptography
- Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based
- Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions
- General Certificateless Encryption and Timed-Release Encryption
- Advances in Cryptology - EUROCRYPT 2004
- Access control encryption for general policies from standard assumptions
- Zero-Knowledge Arguments for Matrix-Vector Relations and Lattice-Based Group Encryption
- Confined guessing: new signatures from standard assumptions
- Toward Practical Group Encryption
- Mediated traceable anonymous encryption
- Group Encryption
- Traceable Group Encryption
- Strengthening access control encryption
- Access Control Encryption for Equality, Comparison, and More
- Functional Encryption: Deterministic to Randomized Functions from Simple Assumptions
- Multi-client oblivious RAM with poly-logarithmic communication
Cited In (2)
This page was built for publication: Access control encryption from group encryption
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2117042)