Bounded-Collusion Attribute-Based Encryption from Minimal Assumptions
From MaRDI portal
Publication:5738752
DOI10.1007/978-3-662-54388-7_3zbMATH Open1400.94151OpenAlexW2585965494MaRDI QIDQ5738752FDOQ5738752
Authors:
Publication date: 13 June 2017
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-54388-7_3
Recommendations
- Fully collusion-resistant traceable key-policy attribute-based encryption with sub-linear size ciphertexts
- Attribute-based fully homomorphic encryption with a bounded number of inputs
- Attribute-Based Fully Homomorphic Encryption with a Bounded Number of Inputs
- Optimal bounded-collusion secure functional encryption
- User Collusion Avoidance Scheme for Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption
- Bounded-collusion identity-based encryption from semantically-secure public-key encryption: generic constructions with short ciphertexts
- Bounded-collusion decentralized ABE with sublinear parameters
- Functional encryption for bounded collusions, revisited
- Bounded-collusion IBE from key homomorphism
- Attribute Based Encryption with Direct Efficiency Tradeoff
Cites Work
- Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization
- Title not available (Why is that?)
- Title not available (Why is that?)
- Fuzzy Identity-Based Encryption
- Attribute-based encryption for circuits from multilinear maps
- Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption
- Title not available (Why is that?)
- Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys
- Attribute-based encryption for circuits
- Computationally private randomizing polynomials and their applications
- Title not available (Why is that?)
- Functional encryption with bounded collusions via multi-party computation
- Function-private functional encryption in the private-key setting
- Reusable garbled circuits and succinct functional encryption
- Bounded CCA2-Secure Encryption
- Functional encryption for bounded collusions, revisited
- Bounded-collusion IBE from key homomorphism
- On black-box reductions between predicate encryption schemes
- Bounded-collusion identity-based encryption from semantically-secure public-key encryption: generic constructions with short ciphertexts
- On black-box constructions of predicate encryption from trapdoor permutations
Cited In (9)
- Public key encryption with secure key leasing
- Bounded Collusion ABE for TMs from IBE
- Dynamic collusion functional encryption and multi-authority attribute-based encryption
- User Collusion Avoidance Scheme for Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption
- Bounded-collusion identity-based encryption from semantically-secure public-key encryption: generic constructions with short ciphertexts
- Bounded-collusion decentralized ABE with sublinear parameters
- ABE for DFA from LWE against bounded collusions, revisited
- Optimal bounded-collusion secure functional encryption
- Bounded-collusion IBE from key homomorphism
This page was built for publication: Bounded-Collusion Attribute-Based Encryption from Minimal Assumptions
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5738752)