Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization
From MaRDI portal
Publication:3084340
DOI10.1007/978-3-642-19379-8_4zbMath1291.94165OpenAlexW1510795740MaRDI QIDQ3084340
Publication date: 15 March 2011
Published in: Public Key Cryptography – PKC 2011 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-19379-8_4
Related Items
Self-updatable encryption with short public parameters and its extensions, Cryptanalysis of a CP-ABE scheme with policy in normal forms, A bunch of broken schemes: a simple yet powerful linear approach to analyzing security of attribute-based encryption, Upslices, downslices, and secret-sharing with complexity of \(1.5^n\), Secret-sharing schemes for very dense graphs, Attribute-Based Encryption, Blind attribute-based encryption and oblivious transfer with fine-grained access control, An asymptotically perfect secret sharing scheme based on the Chinese Remainder Theorem, Fully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size Ciphertexts, Public key encryption with distributed keyword search, Cross-domain attribute-based access control encryption, Adaptive-secure identity-based inner-product functional encryption and its leakage-resilience, Adaptively secure laconic function evaluation for \(\mathsf{NC}^1\), On the security of joint signature and encryption revisited, A novel model for lattice-based authorized searchable encryption with special keyword, ABE with improved auxiliary input for big data security, A general framework for secure sharing of personal health records in cloud system, Key regeneration-free ciphertext-policy attribute-based encryption and its application, Building a dynamic searchable encrypted medical database for multi-client, A survey of lattice based expressive attribute based encryption, Privacy-preserving resource sharing using permissioned blockchains (the case of smart neighbourhood), Key-Policy Multi-authority Attribute-Based Encryption, Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption, Cryptanalysis of Boyen's attribute-based encryption scheme in TCC 2013, Dual System Encryption Framework in Prime-Order Groups via Computational Pair Encodings, Déjà Q All Over Again: Tighter and Broader Reductions of q-Type Assumptions, Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice, Spatial encryption supporting non-monotone access structure, Accountable Ciphertext-Policy Attribute-Based Encryption Scheme Supporting Public Verifiability and Nonrepudiation, An Efficient and Expressive Ciphertext-Policy Attribute-Based Encryption Scheme with Partially Hidden Access Structures, Ciphertext-Policy Attribute Based Encryption Supporting Access Policy Update, Fully secure revocable attribute-based encryption, Attribute-based encryption schemes with constant-size ciphertexts, Key-policy attribute-based encryption against continual auxiliary input leakage, Accountable CP-ABE with Public Verifiability: How to Effectively Protect the Outsourced Data in Cloud, Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing, Decentralized multi-authority ABE for \(\mathsf{NC}^1\) from BDH, Accountable authority key policy attribute-based encryption, A new technique for compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption, Attribute-based optimistic fair exchange: how to restrict brokers with policies, Improved inner-product encryption with adaptive security and full attribute-hiding, Hierarchical attribute based encryption with continuous leakage-resilience, Expanded Framework for Dual System Encryption and Its Application, An efficient key-policy attribute-based encryption scheme with constant ciphertext length, Distributed Multi-authority Attribute-Based Encryption Using Cellular Automata, Efficient anonymous multi-group broadcast encryption, Extremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verification, Secret-Sharing Schemes: A Survey, Cost-Effective and Scalable Data Sharing in Cloud Storage Using Hierarchical Attribute-Based Encryption with Forward Security, Adaptable key-policy attribute-based encryption with time interval, An efficient attribute-based access control system with break-glass capability for cloud-assisted industrial control system, Security and efficiency data sharing scheme for cloud storage, Self-updatable encryption: time constrained access control with hidden attributes and better efficiency, Computational friendly attribute-based encryptions with short ciphertext, Verifiability-based conversion from CPA to CCA-secure predicate encryption, Research on ciphertext-policy attribute-based encryption with attribute level user revocation in cloud storage, Doubly spatial encryption from DBDH, Attribute-Based Encryption with Fast Decryption, Publicly verifiable searchable symmetric encryption based on efficient cryptographic components, Directly revocable key-policy attribute-based encryption with verifiable ciphertext delegation, Fully secure functional encryption with a large class of relations from the decisional linear assumption, Extensions of access structures and their cryptographic applications, Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings, Practical Ciphertext-Policy Attribute-Based Encryption: Traitor Tracing, Revocation, and Large Universe, Bandwidth-efficient attribute-based key-insulated signatures with message recovery, An expressive and provably secure ciphertext-policy attribute-based encryption, Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts, Compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption, Practical Techniques Building on Encryption for Protecting and Managing Data in the Cloud, SEMD: secure and efficient message dissemination with policy enforcement in VANET, Attribute-based fuzzy identity access control in multicloud computing environments, Expressive attribute-based keyword search with constant-size ciphertext, Secure independent-update concise-expression access control for video on demand in cloud, Privacy-preserving attribute-keyword based data publish-subscribe service on cloud platforms, Forgeability of Wang-Zhu-Feng-Yau's attribute-based signature with policy-and-endorsement mechanism, An LWE-based verifiable threshold secret sharing scheme, Secure and Traceable Framework for Data Circulation, Chosen Ciphertext Secure Attribute-Based Encryption with Outsourced Decryption, A Cloud-Based Access Control Scheme with User Revocation and Attribute Update, Optimal broadcast encryption from pairings and LWE, Lower bounds for leakage-resilient secret sharing, Decentralized multi-authority \textbf{\textsf{ABE}} for \textbf{\textsf{DNF}}s from \textbf{\textsf{LWE}}, Fully secure ABE with outsourced decryption against chosen ciphertext attack, More Efficient Constructions for Inner-Product Encryption, Attribute Based Encryption with Direct Efficiency Tradeoff, Turing Machines with Shortcuts: Efficient Attribute-Based Encryption for Bounded Functions, Attribute-Based Encryption for Range Attributes, Secret Sharing Schemes for Dense Forbidden Graphs, Efficient fully CCA-secure predicate encryptions from pair encodings, Attribute-based encryption with adaptive policy, Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application to Searchable Encryption in Multi-user Setting, On the Efficient Implementation of Pairing-Based Protocols, Attribute-based signcryption scheme based on linear codes, Improvement of an outsourced attribute-based encryption scheme, A decentralized multi-authority ciphertext-policy attribute-based encryption with mediated obfuscation, Blocked linear secret sharing scheme for scalable attribute based encryption in manageable cloud storage system, Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes, Towards secure data retrieval for multi-tenant architecture using attribute-based key word search, Computing on authenticated data, Privacy-preserving encryption scheme using DNA parentage test, (Compact) Adaptively Secure FE for Attribute-Weighted Sums from k-Lin, Quantum attribute-based encryption: a comprehensive study, Fully adaptive decentralized multi-authority \textsf{ABE}, Hierarchical identity-based inner product functional encryption, A practical compiler for attribute-based encryption: new decentralized constructions and more, Decentralized multi-authority attribute-based inner-product FE: large universe and unbounded, GLUE: generalizing unbounded attribute-based encryption for flexible efficiency trade-offs, (Compact) adaptively secure FE for attribute-weighted sums from \(k\)-lin, Elliptic curve cryptography; applications, challenges, recent advances, and future trends: a comprehensive survey, TinyABE: unrestricted ciphertext-policy attribute-based encryption for embedded devices and low-quality networks, Fully collusion resistant trace-and-revoke functional encryption for arbitrary identities, Trapdoor sanitizable and redactable signatures with unlinkability, invisibility and strong context-hiding, Identity-based matchmaking encryption without random oracles, A survey on functional encryption, Additive-homomorphic functional commitments and applications to homomorphic signatures, Achieving privacy-preserving sensitive attributes for large universe based on private set intersection, Hierarchical and non-monotonic key-policy attribute-based encryption and its application, Ciphertext-policy attribute-based encryption for general circuits from bilinear maps, Dual System Framework in Multilinear Settings and Applications to Fully Secure (Compact) ABE for Unbounded-Size Circuits, Bounded-Collusion Attribute-Based Encryption from Minimal Assumptions, The communication complexity of private simultaneous messages, revisited, Match me if you can: matchmaking encryption and its applications, A PROOF OF SECURITY FOR A KEY-POLICY RS-ABE SCHEME