Defending against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems
From MaRDI portal
Publication:3556625
DOI10.1007/978-3-642-05284-2_18zbMath1184.94264OpenAlexW1655672343WikidataQ60245044 ScholiaQ60245044MaRDI QIDQ3556625
Kui Ren, Shucheng Yu, Jin Li, Wenjing Lou
Publication date: 24 April 2010
Published in: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-05284-2_18
Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62)
Related Items (5)
Fully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size Ciphertexts ⋮ Accountable authority key policy attribute-based encryption ⋮ Match me if you can: matchmaking encryption and its applications ⋮ Accountable Large-Universe Attribute-Based Encryption Supporting Any Monotone Access Structures ⋮ Privacy-Aware Attribute-Based Encryption with User Accountability
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Attribute-based on-demand multicast group setup with membership anonymity
- Privacy-Aware Attribute-Based Encryption with User Accountability
- Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures
- Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys
- Advances in Cryptology – CRYPTO 2004
- Fuzzy Identity-Based Encryption
- Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products
This page was built for publication: Defending against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems