Hierarchical and non-monotonic key-policy attribute-based encryption and its application
From MaRDI portal
Publication:6204161
DOI10.1016/j.ins.2022.08.014WikidataQ114848366 ScholiaQ114848366MaRDI QIDQ6204161
Xinyu Feng, Zhonghai Wu, Zhikang Xie, Qingni Shen, Yuejian Fang, Jisheng Dong, Cong Li
Publication date: 27 March 2024
Published in: Information Sciences (Search for Journal in Brave)
standard modelkey-policy attribute-based encryptionnon-monotonic access structureattribute-based encryption with equality test and time-based authorizationhierarchy of authorities
Computer science (68-XX) Game theory, economics, finance, and other social and behavioral sciences (91-XX)
Cites Work
- Unnamed Item
- Efficient selective identity-based encryption without random oracles
- Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts
- Secure threshold multi authority attribute based encryption without a central authority
- Identity-based encryption with equality test and datestamp-based authorization mechanism
- Compact adaptively secure ABE from \(k\)-Lin: beyond \(\mathsf{NC}^1\) and towards \(\mathsf{NL} \)
- Adaptively secure ABE for DFA from \(k\)-Lin and more
- Hierarchical attribute based encryption with continuous leakage-resilience
- Unbounded dynamic predicate compositions in attribute-based encryption
- Realizing chosen ciphertext security generically in attribute-based encryption and predicate encryption
- A fully distributed hierarchical attribute-based encryption scheme
- Wildcarded identity-based encryption
- Multi-authority attribute-based encryption with honest-but-curious central authority
- New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques
- Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption
- Improved Dual System ABE in Prime-Order Groups via Predicate Encodings
- Unbounded HIBE and Attribute-Based Encryption
- Decentralizing Attribute-Based Encryption
- Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization
- Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts
- Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
- Multi-authority Attribute Based Encryption
- Hierarchical ID-Based Cryptography
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- Fuzzy Identity-Based Encryption
- A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption
- Online/Offline Attribute-Based Encryption