Self-updatable encryption with short public parameters and its extensions
From MaRDI portal
Publication:264135
DOI10.1007/S10623-015-0039-9zbMATH Open1352.94046OpenAlexW2003612994WikidataQ122903109 ScholiaQ122903109MaRDI QIDQ264135FDOQ264135
Authors: Kwangsu Lee
Publication date: 5 April 2016
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10623-015-0039-9
Recommendations
- Self-Updatable Encryption: Time Constrained Access Control with Hidden Attributes and Better Efficiency
- Self-updatable encryption: time constrained access control with hidden attributes and better efficiency
- Fully secure self-updatable encryption in prime order bilinear groups
- Fast and secure updatable encryption
- Epoch confidentiality in updatable encryption
Information storage and retrieval of data (68P20) Data encryption (aspects in computer science) (68P25) Cryptography (94A60) Internet topics (68M11)
Cites Work
- Efficient revocable identity-based encryption via subset difference methods
- Self-Updatable Encryption: Time Constrained Access Control with Hidden Attributes and Better Efficiency
- Time-specific encryption from forward-secure encryption
- Dynamic credentials and ciphertext delegation for attribute-based encryption
- Functional encryption: definitions and challenges
- Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization
- Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
- Fully secure self-updatable encryption in prime order bilinear groups
- Time-specific encryption
- Conjunctive, Subset, and Range Queries on Encrypted Data
- Adaptive-ID Secure Revocable Identity-Based Encryption
- Hierarchical ID-Based Cryptography
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Efficient delegation of key generation and revocation functionalities in identity-based encryption
- Revocable identity-based encryption revisited: security model and construction
- Advances in Cryptology - EUROCRYPT 2004
- Efficient Identity-Based Encryption Without Random Oracles
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
Cited In (10)
- Updatable searchable symmetric encryption: definitions and constructions
- Still wrong use of pairings in cryptography
- Revocable attribute-based encryption with decryption key exposure resistance and ciphertext delegation
- Revocable hierarchical identity-based encryption with adaptive security
- A proof of security for a key-policy RS-ABE scheme
- Fully secure self-updatable encryption in prime order bilinear groups
- Public-Key Encryption with Efficient Amortized Updates
- Updatable public key encryption in the standard model
- Self-Updatable Encryption: Time Constrained Access Control with Hidden Attributes and Better Efficiency
- Self-updatable encryption: time constrained access control with hidden attributes and better efficiency
This page was built for publication: Self-updatable encryption with short public parameters and its extensions
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q264135)