Leakage-resilient attribute-based encryption with attribute-hiding
From MaRDI portal
Publication:6547896
DOI10.1007/978-981-97-1238-0_7MaRDI QIDQ6547896FDOQ6547896
Authors: Yijian Zhang, Yunhao Ling, Jie Chen, Luping Wang
Publication date: 31 May 2024
Data encryption (aspects in computer science) (68P25) Cryptography (94A60) Computer security (68M25)
Cites Work
- Simultaneous Hardcore Bits and Cryptography against Memory Attacks
- Fuzzy Identity-Based Encryption
- Identity-based encryption resilient to continual auxiliary leakage
- Achieving leakage resilience through dual system encryption
- On cryptography with auxiliary input
- Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption
- Title not available (Why is that?)
- Theory of Cryptography
- Dual system encryption via doubly selective security: framework, fully secure functional encryption for regular languages, and more
- Key-policy attribute-based encryption against continual auxiliary input leakage
- Hierarchical attribute based encryption with continuous leakage-resilience
- Dual System Encryption via Predicate Encodings
- Improved dual system ABE in prime-order groups via predicate encodings
- Leakage-resilient attribute based encryption in prime-order groups via predicate encodings
- Leakage-resilient functional encryption via pair encodings
- Leakage-resilient identity-based encryption in bounded retrieval model with nearly optimal leakage-ratio
- An Efficient Predicate Encryption with Constant Pairing Computations and Minimum Costs
This page was built for publication: Leakage-resilient attribute-based encryption with attribute-hiding
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6547896)