Access Control Encryption for Equality, Comparison, and More
From MaRDI portal
Publication:5738753
DOI10.1007/978-3-662-54388-7_4zbMath1400.94144OpenAlexW2584385672MaRDI QIDQ5738753
Lucas Kowalczyk, Claudio Orlandi, Romain Gay, Georg Fuchsbauer
Publication date: 13 June 2017
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-54388-7_4
Related Items
Cross-domain attribute-based access control encryption, Improved Constructions of Anonymous Credentials from Structure-Preserving Signatures on Equivalence Classes, Structure-preserving signatures on equivalence classes and constant-size anonymous credentials, On access control encryption without sanitization, Access control encryption with efficient verifiable sanitized decryption, Public key based searchable encryption with fine-grained sender permission control, ACE with Compact Ciphertext Size and Decentralized Sanitizers, Match me if you can: matchmaking encryption and its applications, An efficient CCA-secure access control encryption for any policy, Access control encryption from group encryption
Cites Work
- Structure-preserving signatures and commitments to group elements
- Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits
- Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption
- Structure-Preserving Signatures on Equivalence Classes and Their Application to Anonymous Credentials
- Predicate Encryption for Multi-dimensional Range Queries from Lattices
- Identity-Based Cryptosystems and Signature Schemes
- Functional Encryption: Definitions and Challenges
- Access Control Encryption: Enforcing Information Flow with Cryptography
- Practical Round-Optimal Blind Signatures in the Standard Model
- Structure-Preserving Signatures from Standard Assumptions, Revisited
- Structure-Preserving Signatures and Commitments to Group Elements
- Mediated Traceable Anonymous Encryption
- Foundations of Cryptography
- A public key cryptosystem and a signature scheme based on discrete logarithms
- Efficient Noninteractive Proof Systems for Bilinear Groups
- Optimal Structure-Preserving Signatures in Asymmetric Bilinear Groups
- Advances in Cryptology – CRYPTO 2004
- Fuzzy Identity-Based Encryption
- Efficient Non-interactive Proof Systems for Bilinear Groups
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item