Constant Size Ciphertexts in Threshold Attribute-Based Encryption
From MaRDI portal
Publication:3562885
DOI10.1007/978-3-642-13013-7_2zbMath1271.94021OpenAlexW1496212871MaRDI QIDQ3562885
Javier Herranz, Fabien Laguillaumie, Carla Ràfols
Publication date: 28 May 2010
Published in: Public Key Cryptography – PKC 2010 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-13013-7_2
Related Items (23)
Cryptanalysis of a CP-ABE scheme with policy in normal forms ⋮ Short Attribute-Based Signatures for Threshold Predicates ⋮ Generalized closest substring encryption ⋮ Fully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size Ciphertexts ⋮ Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice ⋮ Ciphertext-Policy Attribute Based Encryption Supporting Access Policy Update ⋮ TinyABE: unrestricted ciphertext-policy attribute-based encryption for embedded devices and low-quality networks ⋮ Attribute-based encryption schemes with constant-size ciphertexts ⋮ Identity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parameters ⋮ Generic conversions from CPA to CCA without ciphertext expansion for threshold ABE with constant-size ciphertexts ⋮ Succinct multi-authority attribute-based access control for circuits with authenticated outsourcing ⋮ A new technique for compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption ⋮ An efficient and revocable storage CP-ABE scheme in the cloud computing ⋮ An efficient key-policy attribute-based encryption scheme with constant ciphertext length ⋮ Computational friendly attribute-based encryptions with short ciphertext ⋮ Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings ⋮ Practical Ciphertext-Policy Attribute-Based Encryption: Traitor Tracing, Revocation, and Large Universe ⋮ Compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption ⋮ Expressive attribute-based keyword search with constant-size ciphertext ⋮ Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing ⋮ Edit Distance Based Encryption and Its Application ⋮ Efficient Ciphertext Policy Attribute-Based Encryption with Constant-Size Ciphertext and Constant Computation-Cost ⋮ Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes
This page was built for publication: Constant Size Ciphertexts in Threshold Attribute-Based Encryption