Functional broadcast encryption with applications to data sharing for cloud storage
DOI10.1016/J.INS.2019.06.028zbMATH Open1453.68069OpenAlexW2951945251WikidataQ121162991 ScholiaQ121162991MaRDI QIDQ2224865FDOQ2224865
Authors: Huige Wang, Yuan Zhang, Guangye Sui, Yunlei Zhao, Kefei Chen, Xinyi Huang
Publication date: 4 February 2021
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2019.06.028
Recommendations
- Unconditionally secure revocable storage: tight bounds, optimal construction, and robustness
- Cost-effective and scalable data sharing in cloud storage using hierarchical attribute-based encryption with forward security
- Adaptively secure certificate-based broadcast encryption and its application to cloud storage service
- Realizing fine-grained and flexible access control to outsourced data with attribute-based cryptosystems
- Efficient subtree-based encryption for fuzzy-entity data sharing
Information storage and retrieval of data (68P20) Data encryption (aspects in computer science) (68P25) Internet topics (68M11)
Cites Work
- Functional encryption: definitions and challenges
- Conjunctive, Subset, and Range Queries on Encrypted Data
- Careful with composition: limitations of the indifferentiability framework
- The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs
- Title not available (Why is that?)
- Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys
- Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products
- Candidate indistinguishability obfuscation and functional encryption for all circuits
- How to use indistinguishability obfuscation
- Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts)
- Multi-input inner-product functional encryption from pairings
- Indistinguishability obfuscation from compact functional encryption
- Constrained pseudorandom functions and their applications
- Title not available (Why is that?)
- Functional encryption for randomized functionalities
- Indistinguishability obfuscation from semantically-secure multilinear encodings
- From selective to adaptive security in functional encryption
- Functional signatures and pseudorandom functions
- Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation
- Making public key functional encryption function private, distributively
- Tight adaptively secure broadcast encryption with short ciphertexts and keys
- Access control encryption with efficient verifiable sanitized decryption
- Identity-based key-exposure resilient cloud storage public auditing scheme from lattices
Cited In (2)
This page was built for publication: Functional broadcast encryption with applications to data sharing for cloud storage
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2224865)