Multi-authority Attribute Based Encryption
From MaRDI portal
Publication:3596401
Recommendations
- Secure threshold multi authority attribute based encryption without a central authority
- Secure Threshold Multi Authority Attribute Based Encryption without a Central Authority
- ON MULTI-AUTHORITY CIPHERTEXT-POLICY ATTRIBUTE-BASED ENCRYPTION
- Efficient statically-secure large-universe multi-authority attribute-based encryption
- Decentralizing attribute-based encryption
Cited in
(69)- Key-policy attribute-based encryption against continual auxiliary input leakage
- A bunch of broken schemes: a simple yet powerful linear approach to analyzing security of attribute-based encryption
- Security-level switchable attribute-based encryption under the strictly weaker assumption family
- Multi-authority attribute-based encryption with honest-but-curious central authority
- Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts
- Provably secure role-based encryption with revocation mechanism
- A practical compiler for attribute-based encryption: new decentralized constructions and more
- Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures
- Secure threshold multi authority attribute based encryption without a central authority
- Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing
- Key-policy multi-authority attribute-based encryption
- Attribute-based encryption schemes with constant-size ciphertexts
- A novel lightweight decentralized attribute-based signature scheme for social co-governance
- Escrow free attribute-based signature with self-revealability
- Functional encryption: origins and recent developments
- Simplifying design and analysis of complex predicate encryption schemes
- Generalized closest substring encryption
- Quantum attribute-based encryption: a comprehensive study
- Efficient fully CCA-secure predicate encryptions from pair encodings
- A survey on functional encryption
- Improved fully adaptive decentralized MA-ABE for NC1 from MDDH
- Fully adaptive decentralized multi-authority \textsf{ABE}
- Multi-authority ABE for non-monotonic access structures
- Multi-authority ABE from lattices without random oracles
- A proof of security for a key-policy RS-ABE scheme
- Match me if you can: matchmaking encryption and its applications
- Registered attribute-based encryption
- Multi-party functional encryption
- Forgeability of Wang-Zhu-Feng-Yau's attribute-based signature with policy-and-endorsement mechanism
- Bilinear entropy expansion from the decisional linear assumption
- Attribute-based multi-input FE (and more) for attribute-weighted sums
- Decentralized attribute-based signatures
- Efficient quantum multi-authority attribute-based encryption and generalizations
- Decentralized policy-hiding ABE with receiver privacy
- A survey of lattice based expressive attribute based encryption
- Privacy-preserving resource sharing using permissioned blockchains (the case of smart neighbourhood)
- Decentralized multi-authority \textbf{\textsf{ABE}} for \textbf{\textsf{DNF}}s from \textbf{\textsf{LWE}}
- Fuzzy matching and direct revocation: a new CP-ABE scheme from multilinear maps
- Secure Threshold Multi Authority Attribute Based Encryption without a Central Authority
- Hierarchical and non-monotonic key-policy attribute-based encryption and its application
- Dynamic collusion functional encryption and multi-authority attribute-based encryption
- R3PO: reach-restricted reactive program obfuscation and its applications
- scientific article; zbMATH DE number 6402469 (Why is no real title available?)
- A decentralized multi-authority ciphertext-policy attribute-based encryption with mediated obfuscation
- Attribute-based fuzzy identity access control in multicloud computing environments
- Expanded Framework for Dual System Encryption and Its Application
- Attribute-based signatures
- Security and Anonymity of Identity-Based Encryption with Multiple Trusted Authorities
- Redactable Transactions in Consortium Blockchain: Controlled by Multi-authority CP-ABE
- A Fuzzy ID-Based Encryption Efficient When Error Rate Is Low
- Hidden attribute-based signatures without anonymity revocation
- Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice
- A multi-authority approach to various predicate encryption types
- Bounded-collusion decentralized ABE with sublinear parameters
- A general framework for secure sharing of personal health records in cloud system
- Chosen ciphertext secure fuzzy identity based encryption without ROM
- Decentralized multi-authority ABE for \(\mathsf{NC}^1\) from BDH
- Conjunctive Broadcast and Attribute-Based Encryption
- Self-updatable encryption: time constrained access control with hidden attributes and better efficiency
- Computational friendly attribute-based encryptions with short ciphertext
- scientific article; zbMATH DE number 6985624 (Why is no real title available?)
- Succinct multi-authority attribute-based access control for circuits with authenticated outsourcing
- Decentralizing attribute-based encryption
- Efficient ciphertext policy attribute-based encryption with constant-size ciphertext and constant computation-cost
- Efficient statically-secure large-universe multi-authority attribute-based encryption
- Ciphertext policy attribute-based encryption for circuits from LWE assumption
- Revocable decentralized multi-authority functional encryption
- Distributed multi-authority attribute-based encryption using cellular automata
- Directly revocable key-policy attribute-based encryption with verifiable ciphertext delegation
This page was built for publication: Multi-authority Attribute Based Encryption
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3596401)