Constant Size Ciphertexts in Threshold Attribute-Based Encryption

From MaRDI portal
Publication:3562885


DOI10.1007/978-3-642-13013-7_2zbMath1271.94021OpenAlexW1496212871MaRDI QIDQ3562885

Javier Herranz, Fabien Laguillaumie, Carla Ràfols

Publication date: 28 May 2010

Published in: Public Key Cryptography – PKC 2010 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-13013-7_2



Related Items

Cryptanalysis of a CP-ABE scheme with policy in normal forms, Short Attribute-Based Signatures for Threshold Predicates, Generalized closest substring encryption, Fully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size Ciphertexts, Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice, Ciphertext-Policy Attribute Based Encryption Supporting Access Policy Update, TinyABE: unrestricted ciphertext-policy attribute-based encryption for embedded devices and low-quality networks, Attribute-based encryption schemes with constant-size ciphertexts, Identity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parameters, Generic conversions from CPA to CCA without ciphertext expansion for threshold ABE with constant-size ciphertexts, Succinct multi-authority attribute-based access control for circuits with authenticated outsourcing, A new technique for compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption, An efficient and revocable storage CP-ABE scheme in the cloud computing, An efficient key-policy attribute-based encryption scheme with constant ciphertext length, Computational friendly attribute-based encryptions with short ciphertext, Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings, Practical Ciphertext-Policy Attribute-Based Encryption: Traitor Tracing, Revocation, and Large Universe, Compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption, Expressive attribute-based keyword search with constant-size ciphertext, Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing, Edit Distance Based Encryption and Its Application, Efficient Ciphertext Policy Attribute-Based Encryption with Constant-Size Ciphertext and Constant Computation-Cost, Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes