Attribute-based encryption schemes
From MaRDI portal
Publication:2917152
DOI10.3724/SP.J.1001.2011.03993zbMATH Open1265.68063WikidataQ121761080 ScholiaQ121761080MaRDI QIDQ2917152FDOQ2917152
Authors: Jinshu Su, Dan Cao, Yipin Sun, Qiaolin Hu, Xiaofeng Wang
Publication date: 5 October 2012
Published in: Journal of Software (Search for Journal in Brave)
Recommendations
Cited In (21)
- Security-level switchable attribute-based encryption under the strictly weaker assumption family
- Attribute-based encryption with adaptive policy
- Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts
- Authority for SWIM based on attribute encryption
- Attribute‐Based Encryption
- ABE with improved auxiliary input for big data security
- Attribute-based encryption for circuits
- Attribute-based encryption
- Attribute-based encryption
- Improvement of attribute-based encryption using Blakley secret sharing
- Unbounded HIBE and Attribute-Based Encryption
- Cryptanalysis of Boyen's attribute-based encryption scheme in TCC 2013
- Attribute Based Encryption with Direct Efficiency Tradeoff
- A survey of lattice based expressive attribute based encryption
- Defending against key abuse attacks in KP-ABE enabled broadcast systems
- Title not available (Why is that?)
- Attribute-Based Encryption Resilient to Auxiliary Input
- Online/Offline Attribute-Based Encryption
- Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice
- Secure independent-update concise-expression access control for video on demand in cloud
- Attribute-based encryption for range attributes
This page was built for publication: Attribute-based encryption schemes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2917152)