Chosen ciphertext secure attribute-based encryption with outsourced decryption
From MaRDI portal
Publication:2817488
DOI10.1007/978-3-319-40253-6_30zbMATH Open1405.94097OpenAlexW2483700441MaRDI QIDQ2817488FDOQ2817488
Authors: Cong Zuo, Guiyi Wei, Mande Xie, Min Ji
Publication date: 31 August 2016
Published in: Information Security and Privacy (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-40253-6_30
Recommendations
- Fully secure ABE with outsourced decryption against chosen ciphertext attack
- Improvement of an outsourced attribute-based encryption scheme
- Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing
- Fully secure ciphertext-policy attribute based encryption with security mediator
- Generic constructions for chosen-ciphertext secure attribute based encryption
Cites Work
- Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization
- Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
- Secure integration of asymmetric and symmetric encryption schemes
- Fuzzy Identity-Based Encryption
- Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption
- Fully secure functional encryption with general relations from the decisional linear assumption
- Title not available (Why is that?)
- Advances in Cryptology - EUROCRYPT 2004
- Fully secure unbounded inner-product and attribute-based encryption
Cited In (7)
- Fully secure ciphertext-policy attribute based encryption with security mediator
- Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing
- Comments on ``Circuit ciphertext-policy attribute-based hybrid encryption with verifiable delegation
- An Outsourced Decryption ABE Model using ECC in Internet of Things
- Fully secure ABE with outsourced decryption against chosen ciphertext attack
- Improvement of an outsourced attribute-based encryption scheme
- Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing
This page was built for publication: Chosen ciphertext secure attribute-based encryption with outsourced decryption
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2817488)