Fully collusion-resistant traceable key-policy attribute-based encryption with sub-linear size ciphertexts
From MaRDI portal
Publication:3454597
Recommendations
- Efficient ciphertext-policy attribute-based encryption with blackbox traceability
- Practical ciphertext-policy attribute-based encryption: traitor tracing, revocation, and large universe
- Efficient attribute-based encryption with blackbox traceability
- Making \textit{any} attribute-based encryption accountable, efficiently
- Large universe ciphertext-policy attribute-based encryption with white-box traceability
Cites work
- Attribute-based encryption for circuits from multilinear maps
- Bounded Ciphertext Policy Attribute Based Encryption
- Bounds for commutators of multilinear fractional integral operators with homogeneous kernels
- Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization
- Constant size ciphertexts in threshold attribute-based encryption
- Defending against key abuse attacks in KP-ABE enabled broadcast systems
- Expressive key-policy attribute-based encryption with constant-size ciphertexts
- Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys
- Fully secure functional encryption with general relations from the decisional linear assumption
- Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption
- Functional encryption for regular languages
- Fuzzy Identity-Based Encryption
- New proof methods for attribute-based encryption: achieving full security through selective techniques
- Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products
- Theory of Cryptography
Cited in
(11)- Bounded-Collusion Attribute-Based Encryption from Minimal Assumptions
- Key regeneration-free ciphertext-policy attribute-based encryption and its application
- Covercrypt: an efficient early-abort KEM for hidden access policies with traceability from the DDH and LWE
- Bounded-collusion decentralized ABE with sublinear parameters
- Large universe ciphertext-policy attribute-based encryption with white-box traceability
- Making \textit{any} attribute-based encryption accountable, efficiently
- Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys
- Traceable PRFs: full collusion resistance and active security
- Key-policy ABE with switchable attributes
- User Collusion Avoidance Scheme for Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption
- Practical ciphertext-policy attribute-based encryption: traitor tracing, revocation, and large universe
This page was built for publication: Fully collusion-resistant traceable key-policy attribute-based encryption with sub-linear size ciphertexts
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3454597)