Privacy-Aware Attribute-Based Encryption with User Accountability
From MaRDI portal
Publication:3399216
DOI10.1007/978-3-642-04474-8_28zbMath1307.94070DBLPconf/isw/LiRZW09OpenAlexW2125974812WikidataQ60245077 ScholiaQ60245077MaRDI QIDQ3399216
Bo Zhu, Jin Li, Kui Ren, Zhiguo Wan
Publication date: 29 September 2009
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-04474-8_28
Related Items (13)
A bunch of broken schemes: a simple yet powerful linear approach to analyzing security of attribute-based encryption ⋮ Key regeneration-free ciphertext-policy attribute-based encryption and its application ⋮ An Efficient and Expressive Ciphertext-Policy Attribute-Based Encryption Scheme with Partially Hidden Access Structures ⋮ Ciphertext-Policy Attribute Based Encryption Supporting Access Policy Update ⋮ Achieving privacy-preserving sensitive attributes for large universe based on private set intersection ⋮ On the Security of a Searchable Anonymous Attribute Based Encryption ⋮ Fully Secure Hidden Ciphertext-Policy Attribute-Based Proxy Re-encryption ⋮ Defending against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems ⋮ Fine-grained searchable encryption in multi-user setting ⋮ SEMD: secure and efficient message dissemination with policy enforcement in VANET ⋮ Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing ⋮ Accountable Large-Universe Attribute-Based Encryption Supporting Any Monotone Access Structures ⋮ Privacy-Aware Attribute-Based Encryption with User Accountability
Cites Work
- Unnamed Item
- Attribute-based encryption without key cloning
- Privacy-Aware Attribute-Based Encryption with User Accountability
- Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures
- Bounded Ciphertext Policy Attribute Based Encryption
- Defending against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems
- Identity-Based Encryption Gone Wild
- Conjunctive, Subset, and Range Queries on Encrypted Data
- Secure integration of asymmetric and symmetric encryption schemes
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology – CRYPTO 2004
- Fuzzy Identity-Based Encryption
- Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products
This page was built for publication: Privacy-Aware Attribute-Based Encryption with User Accountability