Practical Ciphertext-Policy Attribute-Based Encryption: Traitor Tracing, Revocation, and Large Universe
From MaRDI portal
Publication:2794498
DOI10.1007/978-3-319-28166-7_7zbMath1459.94127OpenAlexW2293820092MaRDI QIDQ2794498
Publication date: 10 March 2016
Published in: Applied Cryptography and Network Security (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-28166-7_7
Related Items (6)
Traitor-tracing from LWE made simple and attribute-based ⋮ Forward and backward secure keyword search with flexible keyword shielding ⋮ Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice ⋮ Key-policy ABE with switchable attributes ⋮ A survey on functional encryption ⋮ Accountable Large-Universe Attribute-Based Encryption Supporting Any Monotone Access Structures
Cites Work
- Unnamed Item
- Unnamed Item
- Tools for Simulating Features of Composite Order Bilinear Groups in the Prime Order Setting
- New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques
- Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption
- Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization
- Conjunctive Broadcast and Attribute-Based Encryption
- Bounded Ciphertext Policy Attribute Based Encryption
- Constant Size Ciphertexts in Threshold Attribute-Based Encryption
- Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
- Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption
- Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys
- Fully Secure Unbounded Inner-Product and Attribute-Based Encryption
- Fuzzy Identity-Based Encryption
This page was built for publication: Practical Ciphertext-Policy Attribute-Based Encryption: Traitor Tracing, Revocation, and Large Universe