Self-updatable encryption with short public parameters and its extensions
From MaRDI portal
Publication:264135
DOI10.1007/s10623-015-0039-9zbMath1352.94046OpenAlexW2003612994WikidataQ122903109 ScholiaQ122903109MaRDI QIDQ264135
Publication date: 5 April 2016
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10623-015-0039-9
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Information storage and retrieval of data (68P20) Internet topics (68M11)
Related Items (6)
Updatable searchable symmetric encryption: definitions and constructions ⋮ Self-updatable encryption: time constrained access control with hidden attributes and better efficiency ⋮ Revocable attribute-based encryption with decryption key exposure resistance and ciphertext delegation ⋮ Revocable hierarchical identity-based encryption with adaptive security ⋮ A PROOF OF SECURITY FOR A KEY-POLICY RS-ABE SCHEME ⋮ Still wrong use of pairings in cryptography
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Efficient revocable identity-based encryption via subset difference methods
- Self-Updatable Encryption: Time Constrained Access Control with Hidden Attributes and Better Efficiency
- Time-Specific Encryption from Forward-Secure Encryption
- Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption
- Functional Encryption: Definitions and Challenges
- Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization
- Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
- Fully Secure Self-Updatable Encryption in Prime Order Bilinear Groups
- Time-Specific Encryption
- Conjunctive, Subset, and Range Queries on Encrypted Data
- Adaptive-ID Secure Revocable Identity-Based Encryption
- Hierarchical ID-Based Cryptography
- Efficient Delegation of Key Generation and Revocation Functionalities in Identity-Based Encryption
- Revocable Identity-Based Encryption Revisited: Security Model and Construction
- Advances in Cryptology - EUROCRYPT 2004
- Efficient Identity-Based Encryption Without Random Oracles
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
This page was built for publication: Self-updatable encryption with short public parameters and its extensions