Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures
From MaRDI portal
Publication:3506405
DOI10.1007/978-3-540-68914-0_7zbMath1319.94081OpenAlexW1513551553MaRDI QIDQ3506405
Kazuki Yoneyama, Kazuo Ohta, Takashi Nishide
Publication date: 13 June 2008
Published in: Applied Cryptography and Network Security (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-68914-0_7
Related Items (20)
Attribute-Based Encryption ⋮ Blind attribute-based encryption and oblivious transfer with fine-grained access control ⋮ A novel model for lattice-based authorized searchable encryption with special keyword ⋮ Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice ⋮ An Efficient and Expressive Ciphertext-Policy Attribute-Based Encryption Scheme with Partially Hidden Access Structures ⋮ Ciphertext-Policy Attribute Based Encryption Supporting Access Policy Update ⋮ Privacy-enhanced attribute-based private information retrieval ⋮ On the Security of a Searchable Anonymous Attribute Based Encryption ⋮ Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage ⋮ Fully Secure Hidden Ciphertext-Policy Attribute-Based Proxy Re-encryption ⋮ Defending against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems ⋮ Fine-grained searchable encryption in multi-user setting ⋮ Match me if you can: matchmaking encryption and its applications ⋮ Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing ⋮ Adaptive oblivious transfer with access control from lattice assumptions ⋮ DMU-ABSE: Dynamic Multi-user Attribute-Based Searchable Encryption with File Deletion and User Revocation ⋮ Secret Handshakes with Dynamic Expressive Matching Policy ⋮ Ciphertext-Policy Attribute-Based Encryption with Key-Delegation Abuse Resistance ⋮ Accountable Large-Universe Attribute-Based Encryption Supporting Any Monotone Access Structures ⋮ Privacy-Aware Attribute-Based Encryption with User Accountability
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Attribute-Based Broadcast Encryption Scheme Made Efficient
- Identity-Based Encryption Gone Wild
- Conjunctive, Subset, and Range Queries on Encrypted Data
- Multi-authority Attribute Based Encryption
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology – CRYPTO 2004
- Compact E-Cash
- Fuzzy Identity-Based Encryption
- Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products
- Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)
This page was built for publication: Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures