Multi-authority Attribute Based Encryption
From MaRDI portal
Publication:3596401
DOI10.1007/978-3-540-70936-7_28zbMATH Open1156.94339OpenAlexW1763482972MaRDI QIDQ3596401FDOQ3596401
Publication date: 30 August 2007
Published in: Theory of Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-70936-7_28
Cited In (68)
- A PROOF OF SECURITY FOR A KEY-POLICY RS-ABE SCHEME
- A novel lightweight decentralized attribute-based signature scheme for social co-governance
- Quantum attribute-based encryption: a comprehensive study
- A survey on functional encryption
- Improved fully adaptive decentralized MA-ABE for NC1 from MDDH
- Registered attribute-based encryption
- Attribute-based multi-input FE (and more) for attribute-weighted sums
- Efficient quantum multi-authority attribute-based encryption and generalizations
- Hierarchical and non-monotonic key-policy attribute-based encryption and its application
- Dynamic collusion functional encryption and multi-authority attribute-based encryption
- R3PO: reach-restricted reactive program obfuscation and its applications
- Redactable Transactions in Consortium Blockchain: Controlled by Multi-authority CP-ABE
- A Fuzzy ID-Based Encryption Efficient When Error Rate Is Low
- Bounded-collusion decentralized ABE with sublinear parameters
- Ciphertext policy attribute-based encryption for circuits from LWE assumption
- Security-level switchable attribute-based encryption under the strictly weaker assumption family
- A bunch of broken schemes: a simple yet powerful linear approach to analyzing security of attribute-based encryption
- Multi-authority attribute-based encryption with honest-but-curious central authority
- A practical compiler for attribute-based encryption: new decentralized constructions and more
- Provably secure role-based encryption with revocation mechanism
- Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts
- Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures
- Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing
- Secure threshold multi authority attribute based encryption without a central authority
- Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption
- Attribute-based encryption schemes with constant-size ciphertexts
- Decentralized Attribute-Based Signatures
- Efficient Ciphertext Policy Attribute-Based Encryption with Constant-Size Ciphertext and Constant Computation-Cost
- Revocable Decentralized Multi-Authority Functional Encryption
- Distributed Multi-authority Attribute-Based Encryption Using Cellular Automata
- Escrow free attribute-based signature with self-revealability
- Generalized closest substring encryption
- Efficient fully CCA-secure predicate encryptions from pair encodings
- Fully adaptive decentralized multi-authority \textsf{ABE}
- Multi-authority ABE for non-monotonic access structures
- Multi-authority ABE from lattices without random oracles
- Key-Policy Multi-authority Attribute-Based Encryption
- Match me if you can: matchmaking encryption and its applications
- Multi-party functional encryption
- Forgeability of Wang-Zhu-Feng-Yau's attribute-based signature with policy-and-endorsement mechanism
- Decentralized policy-hiding ABE with receiver privacy
- A survey of lattice based expressive attribute based encryption
- Privacy-preserving resource sharing using permissioned blockchains (the case of smart neighbourhood)
- Secure Threshold Multi Authority Attribute Based Encryption without a Central Authority
- Decentralized multi-authority \textbf{\textsf{ABE}} for \textbf{\textsf{DNF}}s from \textbf{\textsf{LWE}}
- Fuzzy matching and direct revocation: a new CP-ABE scheme from multilinear maps
- Title not available (Why is that?)
- Expanded Framework for Dual System Encryption and Its Application
- Attribute-based fuzzy identity access control in multicloud computing environments
- A decentralized multi-authority ciphertext-policy attribute-based encryption with mediated obfuscation
- Security and Anonymity of Identity-Based Encryption with Multiple Trusted Authorities
- Hidden attribute-based signatures without anonymity revocation
- Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice
- A multi-authority approach to various predicate encryption types
- A general framework for secure sharing of personal health records in cloud system
- Decentralized multi-authority ABE for \(\mathsf{NC}^1\) from BDH
- Chosen ciphertext secure fuzzy identity based encryption without ROM
- Conjunctive Broadcast and Attribute-Based Encryption
- Functional Encryption: Origins and Recent Developments
- Bilinear Entropy Expansion from the Decisional Linear Assumption
- Title not available (Why is that?)
- Self-updatable encryption: time constrained access control with hidden attributes and better efficiency
- Computational friendly attribute-based encryptions with short ciphertext
- Succinct multi-authority attribute-based access control for circuits with authenticated outsourcing
- Simplifying Design and Analysis of Complex Predicate Encryption Schemes
- Attribute-Based Signatures
- Directly revocable key-policy attribute-based encryption with verifiable ciphertext delegation
- Key-policy attribute-based encryption against continual auxiliary input leakage
This page was built for publication: Multi-authority Attribute Based Encryption
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3596401)