Access control encryption from group encryption
From MaRDI portal
Publication:2117042
Recommendations
- Strengthening access control encryption
- Access Control Encryption for Equality, Comparison, and More
- Access control encryption with efficient verifiable sanitized decryption
- Access control encryption for general policies from standard assumptions
- Access control encryption: enforcing information flow with cryptography
Cites work
- Access Control Encryption for Equality, Comparison, and More
- Access control encryption for general policies from standard assumptions
- Access control encryption: enforcing information flow with cryptography
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - EUROCRYPT 2004
- Confined guessing: new signatures from standard assumptions
- Functional encryption: definitions and challenges
- Functional encryption: deterministic to randomized functions from simple assumptions
- General Certificateless Encryption and Timed-Release Encryption
- Group Encryption
- Group encryption: non-interactive realization in the standard model
- Homomorphic encryption from learning with errors: conceptually-simpler, asymptotically-faster, attribute-based
- Mediated traceable anonymous encryption
- Multi-client oblivious RAM with poly-logarithmic communication
- On lattices, learning with errors, random linear codes, and cryptography
- Real traceable signatures
- Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions
- Strengthening access control encryption
- Toward practical group encryption
- Traceable group encryption
- Zero-knowledge arguments for matrix-vector relations and lattice-based group encryption
Cited in
(6)- ACE with compact ciphertext size and decentralized sanitizers
- Access control encryption: enforcing information flow with cryptography
- Strengthening access control encryption
- Access control encryption for general policies from standard assumptions
- Is the Data Encryption Standard a Group? (Preliminary Abstract)
- Cross-domain attribute-based access control encryption
This page was built for publication: Access control encryption from group encryption
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2117042)