Access control encryption with efficient verifiable sanitized decryption
From MaRDI portal
Publication:2200529
DOI10.1016/J.INS.2018.06.068zbMATH Open1441.94095OpenAlexW2809954982WikidataQ123189663 ScholiaQ123189663MaRDI QIDQ2200529FDOQ2200529
Authors: Huige Wang, Joseph K. Liu, Ziyuan Hu, Yu Long, Kefei Chen
Publication date: 22 September 2020
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2018.06.068
Recommendations
- On access control encryption without sanitization
- scientific article; zbMATH DE number 6874618
- An efficient CCA-secure access control encryption for any policy
- Access control encryption: enforcing information flow with cryptography
- Verifiable structured encryption
- Information Security
- Access Control Encryption for Equality, Comparison, and More
- Efficient schemes for committing authenticated encryption
- Efficient fully secure attribute-based encryption schemes for general access structures
- Authenticated and misuse-resistant encryption of key-dependent data
Cites Work
- Functional encryption: definitions and challenges
- Practical Identity-Based Encryption Without Random Oracles
- Fuzzy Identity-Based Encryption
- Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)
- Attribute-based encryption for circuits
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- Access control encryption: enforcing information flow with cryptography
- Functional encryption with bounded collusions via multi-party computation
- Reusable garbled circuits and succinct functional encryption
- Title not available (Why is that?)
- Identity-based encryption secure against selective opening attack
- Access control encryption for general policies from standard assumptions
- Functional encryption for randomized functionalities
- Leakage-Resilient Chosen-Ciphertext Secure Public-Key Encryption from Hash Proof System and One-Time Lossy Filter
- Predicate encryption for circuits from LWE
- Access Control Encryption for Equality, Comparison, and More
- Functional encryption: deterministic to randomized functions from simple assumptions
Cited In (7)
- Functional broadcast encryption with applications to data sharing for cloud storage
- Access control encryption from group encryption
- ACE with compact ciphertext size and decentralized sanitizers
- Title not available (Why is that?)
- Access Control Encryption for Equality, Comparison, and More
- An efficient CCA-secure access control encryption for any policy
- On access control encryption without sanitization
This page was built for publication: Access control encryption with efficient verifiable sanitized decryption
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2200529)