Directly revocable key-policy attribute-based encryption with verifiable ciphertext delegation
From MaRDI portal
Publication:527147
DOI10.1016/j.ins.2014.10.020zbMath1360.68444OpenAlexW1995623136WikidataQ123109399 ScholiaQ123109399MaRDI QIDQ527147
Zhen Han, Qingji Zheng, Yanfeng Shi, Ji-Qiang Liu
Publication date: 16 May 2017
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2014.10.020
Related Items (9)
Generic constructions for fully secure revocable attribute-based encryption ⋮ (Dual) server-aided revocable attribute-based encryption with decryption key exposure resistance ⋮ Server-Aided Directly Revocable Ciphertext-Policy Attribute-Based Encryption with Verifiable Delegation ⋮ Revocable attribute-based encryption with decryption key exposure resistance and ciphertext delegation ⋮ Fuzzy matching and direct revocation: a new CP-ABE scheme from multilinear maps ⋮ Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing ⋮ Accountable Large-Universe Attribute-Based Encryption Supporting Any Monotone Access Structures ⋮ A Cloud-Based Access Control Scheme with User Revocation and Attribute Update ⋮ Attribute-based signcryption scheme based on linear codes
Cites Work
- Unnamed Item
- Unnamed Item
- An expressive and provably secure ciphertext-policy attribute-based encryption
- Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts
- Secure threshold multi authority attribute based encryption without a central authority
- Practical Multilinear Maps over the Integers
- Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption
- Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization
- Conjunctive Broadcast and Attribute-Based Encryption
- Bounded Ciphertext Policy Attribute Based Encryption
- Multi-authority Attribute Based Encryption
- Attribute-Based Encryption Supporting Direct/Indirect Revocation Modes
- Candidate Multilinear Maps from Ideal Lattices
- Fuzzy Identity-Based Encryption
This page was built for publication: Directly revocable key-policy attribute-based encryption with verifiable ciphertext delegation