Functional broadcast encryption with applications to data sharing for cloud storage
From MaRDI portal
Publication:2224865
Recommendations
- Unconditionally secure revocable storage: tight bounds, optimal construction, and robustness
- Cost-effective and scalable data sharing in cloud storage using hierarchical attribute-based encryption with forward security
- Adaptively secure certificate-based broadcast encryption and its application to cloud storage service
- Realizing fine-grained and flexible access control to outsourced data with attribute-based cryptosystems
- Efficient subtree-based encryption for fuzzy-entity data sharing
Cites work
- scientific article; zbMATH DE number 1024079 (Why is no real title available?)
- scientific article; zbMATH DE number 1759788 (Why is no real title available?)
- Access control encryption with efficient verifiable sanitized decryption
- Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts)
- Candidate indistinguishability obfuscation and functional encryption for all circuits
- Careful with composition: limitations of the indifferentiability framework
- Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys
- Conjunctive, Subset, and Range Queries on Encrypted Data
- Constrained pseudorandom functions and their applications
- From selective to adaptive security in functional encryption
- Functional encryption for randomized functionalities
- Functional encryption: definitions and challenges
- Functional signatures and pseudorandom functions
- How to use indistinguishability obfuscation
- Identity-based key-exposure resilient cloud storage public auditing scheme from lattices
- Indistinguishability obfuscation from compact functional encryption
- Indistinguishability obfuscation from semantically-secure multilinear encodings
- Making public key functional encryption function private, distributively
- Multi-input inner-product functional encryption from pairings
- Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation
- Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products
- The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs
- Tight adaptively secure broadcast encryption with short ciphertexts and keys
Cited in
(2)
This page was built for publication: Functional broadcast encryption with applications to data sharing for cloud storage
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2224865)