On access control encryption without sanitization
From MaRDI portal
Publication:6134819
DOI10.1007/978-3-031-14791-3_10zbMATH Open1518.94046MaRDI QIDQ6134819FDOQ6134819
Authors: Cecilia Boschini, Ivan B. Damgård, Claudio Orlandi
Publication date: 25 July 2023
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Recommendations
- Access control encryption with efficient verifiable sanitized decryption
- Access control encryption: enforcing information flow with cryptography
- scientific article; zbMATH DE number 6874618
- Strengthening access control encryption
- Access control encryption for general policies from standard assumptions
- Information Security
- Access Control Encryption for Equality, Comparison, and More
- An efficient CCA-secure access control encryption for any policy
- Cryptanalysis on an access control in a hierarchy
Cites Work
- Title not available (Why is that?)
- The Prisoners’ Problem and the Subliminal Channel
- How to use indistinguishability obfuscation
- Access Control Encryption: Enforcing Information Flow with Cryptography
- Title not available (Why is that?)
- Access control encryption for general policies from standard assumptions
- Cryptographic Reverse Firewalls
- Access Control Encryption for Equality, Comparison, and More
- Collusion-Free Protocols in the Mediated Model
Cited In (2)
This page was built for publication: On access control encryption without sanitization
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6134819)