Access control encryption with efficient verifiable sanitized decryption
From MaRDI portal
Publication:2200529
Recommendations
- On access control encryption without sanitization
- scientific article; zbMATH DE number 6874618
- An efficient CCA-secure access control encryption for any policy
- Access control encryption: enforcing information flow with cryptography
- Verifiable structured encryption
- Information Security
- Access Control Encryption for Equality, Comparison, and More
- Efficient schemes for committing authenticated encryption
- Efficient fully secure attribute-based encryption schemes for general access structures
- Authenticated and misuse-resistant encryption of key-dependent data
Cites work
- scientific article; zbMATH DE number 1842483 (Why is no real title available?)
- Access Control Encryption for Equality, Comparison, and More
- Access control encryption for general policies from standard assumptions
- Access control encryption: enforcing information flow with cryptography
- Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)
- Attribute-based encryption for circuits
- Functional encryption for randomized functionalities
- Functional encryption with bounded collusions via multi-party computation
- Functional encryption: definitions and challenges
- Functional encryption: deterministic to randomized functions from simple assumptions
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- Fuzzy Identity-Based Encryption
- Identity-based encryption secure against selective opening attack
- Leakage-Resilient Chosen-Ciphertext Secure Public-Key Encryption from Hash Proof System and One-Time Lossy Filter
- Practical Identity-Based Encryption Without Random Oracles
- Predicate encryption for circuits from LWE
- Reusable garbled circuits and succinct functional encryption
Cited in
(7)- ACE with compact ciphertext size and decentralized sanitizers
- Access control encryption from group encryption
- An efficient CCA-secure access control encryption for any policy
- Functional broadcast encryption with applications to data sharing for cloud storage
- On access control encryption without sanitization
- scientific article; zbMATH DE number 6874618 (Why is no real title available?)
- Access Control Encryption for Equality, Comparison, and More
This page was built for publication: Access control encryption with efficient verifiable sanitized decryption
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2200529)