Blind attribute-based encryption and oblivious transfer with fine-grained access control
From MaRDI portal
Publication:306333
DOI10.1007/S10623-015-0134-YzbMath1405.94085OpenAlexW2192572736WikidataQ122173756 ScholiaQ122173756MaRDI QIDQ306333
Publication date: 31 August 2016
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10623-015-0134-y
privacycryptographic protocolsattribute-based encryptionaccess controloblivious transferblind key extraction
Related Items (2)
Issuer-free oblivious transfer with access control revisited ⋮ Blind key-generation attribute-based encryption for general predicates
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Efficient oblivious transfers with access control
- On the Non-malleability of the Fiat-Shamir Transform
- Oblivious Transfer with Hidden Access Control from Attribute-Based Encryption
- Issuer-Free Adaptive Oblivious Transfer with Access Policy
- Oblivious Transfer with Access Control : Realizing Disjunction without Duplication
- Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization
- Oblivious Transfer with Hidden Access Control Policies
- Oblivious Transfer with Complex Attribute-Based Access Control
- Universally Composable Identity Based Adaptive Oblivious Transfer with Access Control
- Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures
- Constant-Size Dynamic k-TAA
- Controlling Access to an Oblivious Database Using Stateful Anonymous Credentials
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
- Fuzzy Identity-Based Encryption
- Blind Identity-Based Encryption and Simulatable Oblivious Transfer
- Simulatable Adaptive Oblivious Transfer
This page was built for publication: Blind attribute-based encryption and oblivious transfer with fine-grained access control