Anonymous spatial encryption under affine space delegation functionality with full security
From MaRDI portal
Publication:506150
DOI10.1016/j.ins.2014.03.012zbMath1354.94054OpenAlexW1976536045WikidataQ121078712 ScholiaQ121078712MaRDI QIDQ506150
Mingwu Zhang, Tsuyoshi Takagi, Bo Yang
Publication date: 31 January 2017
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2014.03.012
Related Items (1)
Uses Software
Cites Work
- Unnamed Item
- Finding composite order ordinary elliptic curves using the Cocks-Pinch method
- On the Achievability of Simulation-Based Security for Functional Encryption
- Beyond the Limitation of Prime-Order Bilinear Groups, and Round Optimal Blind Signatures
- Tools for Simulating Features of Composite Order Bilinear Groups in the Prime Order Setting
- New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques
- A Profitable Sub-prime Loan: Obtaining the Advantages of Composite Order in Prime-Order Bilinear Groups
- Anonymous HIBE: Compact Construction Over Prime-Order Groups
- Functional Encryption: Definitions and Challenges
- Unbounded HIBE and Attribute-Based Encryption
- GeoEnc: Geometric Area Based Keys and Policies in Functional Encryption Systems
- Limitations on Transformations from Composite-Order to Prime-Order Groups: The Case of Round-Optimal Blind Signatures
- Fully Secure Anonymous HIBE and Secret-Key Anonymous IBE with Short Ciphertexts
- Generic Constructions for Chosen-Ciphertext Secure Attribute Based Encryption
- Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
- New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
- Delegating Capabilities in Predicate Encryption Systems
- Functional Encryption for Inner Product: Achieving Constant-Size Ciphertexts with Adaptive Security or Support for Negation
- Converting Pairing-Based Cryptosystems from Composite-Order Groups to Prime-Order Groups
- Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
- Generalized Identity Based and Broadcast Encryption Schemes
- Hierarchical Identity Based Encryption with Polynomially Many Levels
- Predicate Privacy in Encryption Systems
- Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts
- Spatial Encryption under Simpler Assumption
- Anonymity from Asymmetry: New Constructions for Anonymous HIBE
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- Why Proving HIBE Systems Secure Is Difficult
- Theory of Cryptography
- Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)
This page was built for publication: Anonymous spatial encryption under affine space delegation functionality with full security