Anonymous attribute-based broadcast encryption with hidden multiple access structures
From MaRDI portal
Publication:6564089
Existence problems for PDEs: global existence, local existence, non-existence (35A01) Numerical analysis (65-XX) Numerical solution of boundary value problems involving ordinary differential equations (65L10) Finite difference and finite volume methods for ordinary differential equations (65L12) Stability and convergence of numerical methods for ordinary differential equations (65L20) Error bounds for numerical methods for ordinary differential equations (65L70)
Recommendations
- Attribute based broadcast encryption with short ciphertext and decryption key
- Ciphertext-Policy Attribute-Based Broadcast Encryption with Small Keys
- Conjunctive Broadcast and Attribute-Based Encryption
- Generic anonymous identity-based broadcast encryption with chosen-ciphertext security
- Attribute-Based Broadcast Encryption Scheme Made Efficient
Cites work
- scientific article; zbMATH DE number 177621 (Why is no real title available?)
- scientific article; zbMATH DE number 1024079 (Why is no real title available?)
- scientific article; zbMATH DE number 1942412 (Why is no real title available?)
- scientific article; zbMATH DE number 3300540 (Why is no real title available?)
- Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption
- Advances in Cryptology – CRYPTO 2004
- Attribute based broadcast encryption with short ciphertext and decryption key
- Attribute-Based Broadcast Encryption Scheme Made Efficient
- Ciphertext-Policy Attribute-Based Broadcast Encryption with Small Keys
- Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization
- Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys
- Conjunctive Broadcast and Attribute-Based Encryption
- Conjunctive, Subset, and Range Queries on Encrypted Data
- Delegating Capabilities in Predicate Encryption Systems
- Efficient Privacy-Preserving Ciphertext-Policy Attribute Based-Encryption and Broadcast Encryption
- Expressive key-policy attribute-based encryption with constant-size ciphertexts
- Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size Ciphertexts or Decryption Keys
- Fully secure cipertext-policy hiding CP-ABE
- Functional encryption for inner product: achieving constant-size ciphertexts with adaptive security or support for negation
- Fuzzy Identity-Based Encryption
- Inner-product encryption under standard assumptions
- New proof methods for attribute-based encryption: achieving full security through selective techniques
- Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products
This page was built for publication: Anonymous attribute-based broadcast encryption with hidden multiple access structures
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6564089)