Oblivious transfer with hidden access control policies
From MaRDI portal
Publication:3084348
DOI10.1007/978-3-642-19379-8_12zbMATH Open1291.94064OpenAlexW1597151159MaRDI QIDQ3084348FDOQ3084348
Authors: Jan Camenisch, Maria Dubovitskaya, Gregory Neven, Gregory M. Zaverucha
Publication date: 15 March 2011
Published in: Public Key Cryptography – PKC 2011 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-19379-8_12
Recommendations
- Oblivious transfer with access control: realizing disjunction without duplication
- Oblivious transfer with complex attribute-based access control
- Oblivious transfer with hidden access control from attribute-based encryption
- Controlling Access to an Oblivious Database Using Stateful Anonymous Credentials
- Unlinkable updatable databases and oblivious transfer with access control
Cited In (21)
- Controlling Access to an Oblivious Database Using Stateful Anonymous Credentials
- Oblivious access control policies for cloud based data sharing systems
- Oblivious keyword search with authorization
- Oblivious transfer and privacy amplification
- Efficient Traceable Oblivious Transfer and Its Applications
- Blind attribute-based encryption and oblivious transfer with fine-grained access control
- Issuer-free oblivious transfer with access control revisited
- Efficient oblivious transfers with access control
- Privacy enhanced access control by means of policy blinding
- Adaptive oblivious transfer with access control from lattice assumptions
- Oblivious transfer with hidden access control from attribute-based encryption
- Oblivious transfer with access control: realizing disjunction without duplication
- Oblivious transfer with complex attribute-based access control
- UC priced oblivious transfer with purchase statistics and dynamic pricing
- Privacy-enhanced attribute-based private information retrieval
- Restricted adaptive oblivious transfer
- Efficient schemes for anonymous yet authorized and bounded use of cloud resources
- Relaxed Lattice-Based Signatures with Short Zero-Knowledge Proofs
- On the impossibility of structure-preserving deterministic primitives
- Blind key-generation attribute-based encryption for general predicates
- Adaptive oblivious transfer and generalization
This page was built for publication: Oblivious transfer with hidden access control policies
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3084348)