Access control encryption from group encryption
From MaRDI portal
Publication:2117042
DOI10.1007/978-3-030-78372-3_16zbMATH Open1491.94071OpenAlexW3168341498MaRDI QIDQ2117042FDOQ2117042
Authors: Xiu-Hua Wang, Harry W. H. Wong, Sherman S. M. Chow
Publication date: 21 March 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-78372-3_16
Recommendations
- Strengthening access control encryption
- Access Control Encryption for Equality, Comparison, and More
- Access control encryption with efficient verifiable sanitized decryption
- Access control encryption for general policies from standard assumptions
- Access control encryption: enforcing information flow with cryptography
chosen-ciphertext securitytraceabilitypost-quantum securitygroup encryptionlattice-based encryptionlearning with erroraccess control encryptionsanitization
Cites Work
- On lattices, learning with errors, random linear codes, and cryptography
- Functional encryption: definitions and challenges
- Group encryption: non-interactive realization in the standard model
- Real traceable signatures
- Advances in Cryptology - EUROCRYPT 2004
- Access control encryption: enforcing information flow with cryptography
- Homomorphic encryption from learning with errors: conceptually-simpler, asymptotically-faster, attribute-based
- Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions
- General Certificateless Encryption and Timed-Release Encryption
- Advances in Cryptology - EUROCRYPT 2004
- Access control encryption for general policies from standard assumptions
- Zero-knowledge arguments for matrix-vector relations and lattice-based group encryption
- Confined guessing: new signatures from standard assumptions
- Toward practical group encryption
- Mediated traceable anonymous encryption
- Group Encryption
- Traceable group encryption
- Strengthening access control encryption
- Access Control Encryption for Equality, Comparison, and More
- Functional encryption: deterministic to randomized functions from simple assumptions
- Multi-client oblivious RAM with poly-logarithmic communication
Cited In (6)
- ACE with compact ciphertext size and decentralized sanitizers
- Access control encryption for general policies from standard assumptions
- Cross-domain attribute-based access control encryption
- Strengthening access control encryption
- Is the Data Encryption Standard a Group? (Preliminary Abstract)
- Access control encryption: enforcing information flow with cryptography
This page was built for publication: Access control encryption from group encryption
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2117042)