Constant Size Ciphertexts in Threshold Attribute-Based Encryption

From MaRDI portal
Publication:3562885

DOI10.1007/978-3-642-13013-7_2zbMath1271.94021OpenAlexW1496212871MaRDI QIDQ3562885

Javier Herranz, Fabien Laguillaumie, Carla Ràfols

Publication date: 28 May 2010

Published in: Public Key Cryptography – PKC 2010 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-13013-7_2




Related Items (23)

Cryptanalysis of a CP-ABE scheme with policy in normal formsShort Attribute-Based Signatures for Threshold PredicatesGeneralized closest substring encryptionFully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size CiphertextsSystematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practiceCiphertext-Policy Attribute Based Encryption Supporting Access Policy UpdateTinyABE: unrestricted ciphertext-policy attribute-based encryption for embedded devices and low-quality networksAttribute-based encryption schemes with constant-size ciphertextsIdentity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parametersGeneric conversions from CPA to CCA without ciphertext expansion for threshold ABE with constant-size ciphertextsSuccinct multi-authority attribute-based access control for circuits with authenticated outsourcingA new technique for compacting ciphertext in multi-channel broadcast encryption and attribute-based encryptionAn efficient and revocable storage CP-ABE scheme in the cloud computingAn efficient key-policy attribute-based encryption scheme with constant ciphertext lengthComputational friendly attribute-based encryptions with short ciphertextDuality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational EncodingsPractical Ciphertext-Policy Attribute-Based Encryption: Traitor Tracing, Revocation, and Large UniverseCompacting ciphertext in multi-channel broadcast encryption and attribute-based encryptionExpressive attribute-based keyword search with constant-size ciphertextEnsuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computingEdit Distance Based Encryption and Its ApplicationEfficient Ciphertext Policy Attribute-Based Encryption with Constant-Size Ciphertext and Constant Computation-CostConstant-size ciphertexts in threshold attribute-based encryption without dummy attributes







This page was built for publication: Constant Size Ciphertexts in Threshold Attribute-Based Encryption