On access control encryption without sanitization
From MaRDI portal
Publication:6134819
DOI10.1007/978-3-031-14791-3_10zbMATH Open1518.94046MaRDI QIDQ6134819FDOQ6134819
Authors: Cecilia Boschini, Ivan B. Damgård, Claudio Orlandi
Publication date: 25 July 2023
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Recommendations
- Access control encryption with efficient verifiable sanitized decryption
- Access control encryption: enforcing information flow with cryptography
- scientific article; zbMATH DE number 6874618
- Strengthening access control encryption
- Access control encryption for general policies from standard assumptions
- Information Security
- Access Control Encryption for Equality, Comparison, and More
- An efficient CCA-secure access control encryption for any policy
- Cryptanalysis on an access control in a hierarchy
Cites Work
- Title not available (Why is that?)
- The prisoners' problem and the subliminal channel
- How to use indistinguishability obfuscation
- Access control encryption: enforcing information flow with cryptography
- Title not available (Why is that?)
- Access control encryption for general policies from standard assumptions
- Cryptographic reverse firewalls
- Access Control Encryption for Equality, Comparison, and More
- Collusion-Free Protocols in the Mediated Model
Cited In (5)
- ACE with compact ciphertext size and decentralized sanitizers
- Access Control Encryption for Equality, Comparison, and More
- Access control encryption with efficient verifiable sanitized decryption
- Strengthening access control encryption
- Access control encryption: enforcing information flow with cryptography
This page was built for publication: On access control encryption without sanitization
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6134819)