Bounded Ciphertext Policy Attribute Based Encryption

From MaRDI portal
Publication:3519534

DOI10.1007/978-3-540-70583-3_47zbMath1155.94369OpenAlexW1513098086MaRDI QIDQ3519534

Abhishek Jain, Omkant Pandey, Vipul Goyal, Amit Sahai

Publication date: 19 August 2008

Published in: Automata, Languages and Programming (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-540-70583-3_47



Related Items

Attribute-Based Encryption, Fully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size Ciphertexts, Bilinear Entropy Expansion from the Decisional Linear Assumption, ABE with improved auxiliary input for big data security, Key regeneration-free ciphertext-policy attribute-based encryption and its application, Efficient and secure attribute-based signature for monotone predicates, A survey of lattice based expressive attribute based encryption, Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption, An Efficient and Expressive Ciphertext-Policy Attribute-Based Encryption Scheme with Partially Hidden Access Structures, Ciphertext-Policy Attribute Based Encryption Supporting Access Policy Update, Attribute-based encryption schemes with constant-size ciphertexts, Provably secure role-based encryption with revocation mechanism, Security-level switchable attribute-based encryption under the strictly weaker assumption family, An efficient key-policy attribute-based encryption scheme with constant ciphertext length, Verifiability-based conversion from CPA to CCA-secure predicate encryption, Attribute-Based Encryption with Fast Decryption, Directly revocable key-policy attribute-based encryption with verifiable ciphertext delegation, Secure threshold multi authority attribute based encryption without a central authority, Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings, Practical Ciphertext-Policy Attribute-Based Encryption: Traitor Tracing, Revocation, and Large Universe, An expressive and provably secure ciphertext-policy attribute-based encryption, Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts, Fuzzy matching and direct revocation: a new CP-ABE scheme from multilinear maps, SEMD: secure and efficient message dissemination with policy enforcement in VANET, Match me if you can: matchmaking encryption and its applications, Ciphertext-Policy Attribute-Based Encryption with Key-Delegation Abuse Resistance, Efficient Ciphertext Policy Attribute-Based Encryption with Constant-Size Ciphertext and Constant Computation-Cost, Conjunctive Broadcast and Attribute-Based Encryption, Attribute-Based Encryption for Range Attributes, A PROOF OF SECURITY FOR A KEY-POLICY RS-ABE SCHEME, Privacy-Aware Attribute-Based Encryption with User Accountability, Efficient fully CCA-secure predicate encryptions from pair encodings, Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application to Searchable Encryption in Multi-user Setting, Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes, A Fuzzy ID-Based Encryption Efficient When Error Rate Is Low