On access control encryption without sanitization
From MaRDI portal
Publication:6134819
Recommendations
- Access control encryption with efficient verifiable sanitized decryption
- Access control encryption: enforcing information flow with cryptography
- scientific article; zbMATH DE number 6874618
- Strengthening access control encryption
- Access control encryption for general policies from standard assumptions
- Information Security
- Access Control Encryption for Equality, Comparison, and More
- An efficient CCA-secure access control encryption for any policy
- Cryptanalysis on an access control in a hierarchy
Cites work
- scientific article; zbMATH DE number 2081087 (Why is no real title available?)
- scientific article; zbMATH DE number 1842483 (Why is no real title available?)
- Access Control Encryption for Equality, Comparison, and More
- Access control encryption for general policies from standard assumptions
- Access control encryption: enforcing information flow with cryptography
- Collusion-Free Protocols in the Mediated Model
- Cryptographic reverse firewalls
- How to use indistinguishability obfuscation
- The prisoners' problem and the subliminal channel
Cited in
(5)- ACE with compact ciphertext size and decentralized sanitizers
- Access control encryption: enforcing information flow with cryptography
- Strengthening access control encryption
- Access control encryption with efficient verifiable sanitized decryption
- Access Control Encryption for Equality, Comparison, and More
This page was built for publication: On access control encryption without sanitization
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6134819)