Access control encryption with efficient verifiable sanitized decryption
From MaRDI portal
Publication:2200529
DOI10.1016/J.INS.2018.06.068zbMATH Open1441.94095OpenAlexW2809954982WikidataQ123189663 ScholiaQ123189663MaRDI QIDQ2200529FDOQ2200529
Ziyuan Hu, Huige Wang, Yu Long, Joseph K. Liu, Kefei Chen
Publication date: 22 September 2020
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2018.06.068
Cites Work
- Functional Encryption: Definitions and Challenges
- Practical Identity-Based Encryption Without Random Oracles
- Fuzzy Identity-Based Encryption
- Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)
- Attribute-based encryption for circuits
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- Access Control Encryption: Enforcing Information Flow with Cryptography
- Functional Encryption with Bounded Collusions via Multi-party Computation
- Reusable garbled circuits and succinct functional encryption
- Title not available (Why is that?)
- Identity-Based Encryption Secure against Selective Opening Attack
- Access control encryption for general policies from standard assumptions
- Functional Encryption for Randomized Functionalities
- Leakage-Resilient Chosen-Ciphertext Secure Public-Key Encryption from Hash Proof System and One-Time Lossy Filter
- Predicate Encryption for Circuits from LWE
- Access Control Encryption for Equality, Comparison, and More
- Functional Encryption: Deterministic to Randomized Functions from Simple Assumptions
Cited In (5)
Recommendations
- On access control encryption without sanitization π π
- Title not available (Why is that?) π π
- An efficient CCA-secure access control encryption for any policy π π
- Access Control Encryption: Enforcing Information Flow with Cryptography π π
- Verifiable Structured Encryption π π
- Information Security π π
- Access Control Encryption for Equality, Comparison, and More π π
- Efficient schemes for committing authenticated encryption π π
- Efficient Fully Secure Attribute-Based Encryption Schemes for General Access Structures π π
- Authenticated and misuse-resistant encryption of key-dependent data π π
This page was built for publication: Access control encryption with efficient verifiable sanitized decryption
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2200529)