Multi-authority Attribute Based Encryption
From MaRDI portal
Publication:3596401
DOI10.1007/978-3-540-70936-7_28zbMath1156.94339OpenAlexW1763482972MaRDI QIDQ3596401
Publication date: 30 August 2007
Published in: Theory of Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-70936-7_28
Related Items
Multi-authority attribute-based encryption with honest-but-curious central authority ⋮ A bunch of broken schemes: a simple yet powerful linear approach to analyzing security of attribute-based encryption ⋮ Generalized closest substring encryption ⋮ Revocable Decentralized Multi-Authority Functional Encryption ⋮ Bilinear Entropy Expansion from the Decisional Linear Assumption ⋮ Decentralized policy-hiding ABE with receiver privacy ⋮ A general framework for secure sharing of personal health records in cloud system ⋮ A survey of lattice based expressive attribute based encryption ⋮ Privacy-preserving resource sharing using permissioned blockchains (the case of smart neighbourhood) ⋮ Key-Policy Multi-authority Attribute-Based Encryption ⋮ Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption ⋮ Bounded-collusion decentralized ABE with sublinear parameters ⋮ Quantum attribute-based encryption: a comprehensive study ⋮ Fully adaptive decentralized multi-authority \textsf{ABE} ⋮ Registered attribute-based encryption ⋮ Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice ⋮ A practical compiler for attribute-based encryption: new decentralized constructions and more ⋮ Multi-authority ABE for non-monotonic access structures ⋮ Multi-authority ABE from lattices without random oracles ⋮ Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures ⋮ Attribute-based encryption schemes with constant-size ciphertexts ⋮ A novel lightweight decentralized attribute-based signature scheme for social co-governance ⋮ A survey on functional encryption ⋮ Attribute-based multi-input FE (and more) for attribute-weighted sums ⋮ Key-policy attribute-based encryption against continual auxiliary input leakage ⋮ Hierarchical and non-monotonic key-policy attribute-based encryption and its application ⋮ Succinct multi-authority attribute-based access control for circuits with authenticated outsourcing ⋮ Provably secure role-based encryption with revocation mechanism ⋮ Decentralized multi-authority ABE for \(\mathsf{NC}^1\) from BDH ⋮ Multi-party functional encryption ⋮ Security-level switchable attribute-based encryption under the strictly weaker assumption family ⋮ Expanded Framework for Dual System Encryption and Its Application ⋮ Chosen ciphertext secure fuzzy identity based encryption without ROM ⋮ Distributed Multi-authority Attribute-Based Encryption Using Cellular Automata ⋮ Self-updatable encryption: time constrained access control with hidden attributes and better efficiency ⋮ Computational friendly attribute-based encryptions with short ciphertext ⋮ Functional Encryption: Origins and Recent Developments ⋮ Decentralized Attribute-Based Signatures ⋮ Directly revocable key-policy attribute-based encryption with verifiable ciphertext delegation ⋮ Simplifying Design and Analysis of Complex Predicate Encryption Schemes ⋮ Hidden attribute-based signatures without anonymity revocation ⋮ Secure threshold multi authority attribute based encryption without a central authority ⋮ Security and Anonymity of Identity-Based Encryption with Multiple Trusted Authorities ⋮ Escrow free attribute-based signature with self-revealability ⋮ Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts ⋮ Fuzzy matching and direct revocation: a new CP-ABE scheme from multilinear maps ⋮ A multi-authority approach to various predicate encryption types ⋮ Match me if you can: matchmaking encryption and its applications ⋮ Attribute-Based Signatures ⋮ Attribute-based fuzzy identity access control in multicloud computing environments ⋮ Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing ⋮ Forgeability of Wang-Zhu-Feng-Yau's attribute-based signature with policy-and-endorsement mechanism ⋮ Decentralized multi-authority \textbf{\textsf{ABE}} for \textbf{\textsf{DNF}}s from \textbf{\textsf{LWE}} ⋮ Efficient Ciphertext Policy Attribute-Based Encryption with Constant-Size Ciphertext and Constant Computation-Cost ⋮ Conjunctive Broadcast and Attribute-Based Encryption ⋮ A PROOF OF SECURITY FOR A KEY-POLICY RS-ABE SCHEME ⋮ Efficient fully CCA-secure predicate encryptions from pair encodings ⋮ A decentralized multi-authority ciphertext-policy attribute-based encryption with mediated obfuscation ⋮ A Fuzzy ID-Based Encryption Efficient When Error Rate Is Low ⋮ Secure Threshold Multi Authority Attribute Based Encryption without a Central Authority
This page was built for publication: Multi-authority Attribute Based Encryption