Bounded-Collusion Attribute-Based Encryption from Minimal Assumptions
From MaRDI portal
Publication:5738752
Recommendations
- Fully collusion-resistant traceable key-policy attribute-based encryption with sub-linear size ciphertexts
- Attribute-based fully homomorphic encryption with a bounded number of inputs
- Attribute-Based Fully Homomorphic Encryption with a Bounded Number of Inputs
- Optimal bounded-collusion secure functional encryption
- User Collusion Avoidance Scheme for Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption
- Bounded-collusion identity-based encryption from semantically-secure public-key encryption: generic constructions with short ciphertexts
- Bounded-collusion decentralized ABE with sublinear parameters
- Functional encryption for bounded collusions, revisited
- Bounded-collusion IBE from key homomorphism
- Attribute Based Encryption with Direct Efficiency Tradeoff
Cites work
- scientific article; zbMATH DE number 1256784 (Why is no real title available?)
- scientific article; zbMATH DE number 1024079 (Why is no real title available?)
- scientific article; zbMATH DE number 2086699 (Why is no real title available?)
- scientific article; zbMATH DE number 1842485 (Why is no real title available?)
- Attribute-based encryption for circuits
- Attribute-based encryption for circuits from multilinear maps
- Bounded CCA2-Secure Encryption
- Bounded-collusion IBE from key homomorphism
- Bounded-collusion identity-based encryption from semantically-secure public-key encryption: generic constructions with short ciphertexts
- Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization
- Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys
- Computationally private randomizing polynomials and their applications
- Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption
- Function-private functional encryption in the private-key setting
- Functional encryption for bounded collusions, revisited
- Functional encryption with bounded collusions via multi-party computation
- Fuzzy Identity-Based Encryption
- On black-box constructions of predicate encryption from trapdoor permutations
- On black-box reductions between predicate encryption schemes
- Reusable garbled circuits and succinct functional encryption
Cited in
(9)- Public key encryption with secure key leasing
- Bounded Collusion ABE for TMs from IBE
- Dynamic collusion functional encryption and multi-authority attribute-based encryption
- User Collusion Avoidance Scheme for Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption
- Bounded-collusion identity-based encryption from semantically-secure public-key encryption: generic constructions with short ciphertexts
- Bounded-collusion decentralized ABE with sublinear parameters
- ABE for DFA from LWE against bounded collusions, revisited
- Optimal bounded-collusion secure functional encryption
- Bounded-collusion IBE from key homomorphism
This page was built for publication: Bounded-Collusion Attribute-Based Encryption from Minimal Assumptions
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5738752)