Multi-authority Attribute Based Encryption

From MaRDI portal
Publication:3596401

DOI10.1007/978-3-540-70936-7_28zbMath1156.94339OpenAlexW1763482972MaRDI QIDQ3596401

Melissa Chase

Publication date: 30 August 2007

Published in: Theory of Cryptography (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-540-70936-7_28




Related Items

Multi-authority attribute-based encryption with honest-but-curious central authorityA bunch of broken schemes: a simple yet powerful linear approach to analyzing security of attribute-based encryptionGeneralized closest substring encryptionRevocable Decentralized Multi-Authority Functional EncryptionBilinear Entropy Expansion from the Decisional Linear AssumptionDecentralized policy-hiding ABE with receiver privacyA general framework for secure sharing of personal health records in cloud systemA survey of lattice based expressive attribute based encryptionPrivacy-preserving resource sharing using permissioned blockchains (the case of smart neighbourhood)Key-Policy Multi-authority Attribute-Based EncryptionEfficient Statically-Secure Large-Universe Multi-Authority Attribute-Based EncryptionBounded-collusion decentralized ABE with sublinear parametersQuantum attribute-based encryption: a comprehensive studyFully adaptive decentralized multi-authority \textsf{ABE}Registered attribute-based encryptionSystematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practiceA practical compiler for attribute-based encryption: new decentralized constructions and moreMulti-authority ABE for non-monotonic access structuresMulti-authority ABE from lattices without random oraclesAttribute-Based Encryption with Partially Hidden Encryptor-Specified Access StructuresAttribute-based encryption schemes with constant-size ciphertextsA novel lightweight decentralized attribute-based signature scheme for social co-governanceA survey on functional encryptionAttribute-based multi-input FE (and more) for attribute-weighted sumsKey-policy attribute-based encryption against continual auxiliary input leakageHierarchical and non-monotonic key-policy attribute-based encryption and its applicationSuccinct multi-authority attribute-based access control for circuits with authenticated outsourcingProvably secure role-based encryption with revocation mechanismDecentralized multi-authority ABE for \(\mathsf{NC}^1\) from BDHMulti-party functional encryptionSecurity-level switchable attribute-based encryption under the strictly weaker assumption familyExpanded Framework for Dual System Encryption and Its ApplicationChosen ciphertext secure fuzzy identity based encryption without ROMDistributed Multi-authority Attribute-Based Encryption Using Cellular AutomataSelf-updatable encryption: time constrained access control with hidden attributes and better efficiencyComputational friendly attribute-based encryptions with short ciphertextFunctional Encryption: Origins and Recent DevelopmentsDecentralized Attribute-Based SignaturesDirectly revocable key-policy attribute-based encryption with verifiable ciphertext delegationSimplifying Design and Analysis of Complex Predicate Encryption SchemesHidden attribute-based signatures without anonymity revocationSecure threshold multi authority attribute based encryption without a central authoritySecurity and Anonymity of Identity-Based Encryption with Multiple Trusted AuthoritiesEscrow free attribute-based signature with self-revealabilityCiphertext-policy hierarchical attribute-based encryption with short ciphertextsFuzzy matching and direct revocation: a new CP-ABE scheme from multilinear mapsA multi-authority approach to various predicate encryption typesMatch me if you can: matchmaking encryption and its applicationsAttribute-Based SignaturesAttribute-based fuzzy identity access control in multicloud computing environmentsEnsuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computingForgeability of Wang-Zhu-Feng-Yau's attribute-based signature with policy-and-endorsement mechanismDecentralized multi-authority \textbf{\textsf{ABE}} for \textbf{\textsf{DNF}}s from \textbf{\textsf{LWE}}Efficient Ciphertext Policy Attribute-Based Encryption with Constant-Size Ciphertext and Constant Computation-CostConjunctive Broadcast and Attribute-Based EncryptionA PROOF OF SECURITY FOR A KEY-POLICY RS-ABE SCHEMEEfficient fully CCA-secure predicate encryptions from pair encodingsA decentralized multi-authority ciphertext-policy attribute-based encryption with mediated obfuscationA Fuzzy ID-Based Encryption Efficient When Error Rate Is LowSecure Threshold Multi Authority Attribute Based Encryption without a Central Authority




This page was built for publication: Multi-authority Attribute Based Encryption