Attribute-based encryption schemes
From MaRDI portal
Publication:2917152
Recommendations
Cited in
(21)- Security-level switchable attribute-based encryption under the strictly weaker assumption family
- Attribute-based encryption with adaptive policy
- Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts
- Authority for SWIM based on attribute encryption
- Attribute‐Based Encryption
- ABE with improved auxiliary input for big data security
- Attribute-based encryption for circuits
- Attribute-based encryption
- Improvement of attribute-based encryption using Blakley secret sharing
- Attribute-based encryption
- Unbounded HIBE and Attribute-Based Encryption
- Cryptanalysis of Boyen's attribute-based encryption scheme in TCC 2013
- Attribute Based Encryption with Direct Efficiency Tradeoff
- A survey of lattice based expressive attribute based encryption
- Defending against key abuse attacks in KP-ABE enabled broadcast systems
- Attribute-Based Encryption Resilient to Auxiliary Input
- scientific article; zbMATH DE number 6402469 (Why is no real title available?)
- Online/Offline Attribute-Based Encryption
- Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice
- Secure independent-update concise-expression access control for video on demand in cloud
- Attribute-based encryption for range attributes
This page was built for publication: Attribute-based encryption schemes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2917152)