Efficient quantum multi-authority attribute-based encryption and generalizations
From MaRDI portal
Publication:6629263
Cites work
- scientific article; zbMATH DE number 3948147 (Why is no real title available?)
- scientific article; zbMATH DE number 1256737 (Why is no real title available?)
- A \(d\)-level quantum secret sharing scheme with cheat-detection \((t, m)\) threshold
- A quantum evolving secret sharing scheme
- Attribute-based functional encryption on lattices
- Candidate indistinguishability obfuscation and functional encryption for all circuits
- Decentralizing attribute-based encryption
- Discrete-time quantum walks and graph structures
- Dynamic quantum secret sharing by using \(d\)-dimensional GHZ state
- Efficient simulation for quantum message authentication
- Efficient statically-secure large-universe multi-authority attribute-based encryption
- Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption
- Functional encryption: definitions and challenges
- Functional encryption: new perspectives and lower bounds
- Fuzzy Identity-Based Encryption
- Indistinguishability obfuscation from functional encryption
- Integer multiplication in time \(O(n\log n)\)
- Multi-authority Attribute Based Encryption
- Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage
- Multi-authority attribute-based encryption with honest-but-curious central authority
- Multi-input functional encryption
- Post-quantum secure inner product functional encryption using multivariate public key cryptography
- QUANTUM WALKS ON GENERAL GRAPHS
- Quantum Homomorphic Encryption for Circuits of Low T-gate Complexity
- Quantum attribute-based encryption: a comprehensive study
- Quantum one-time programs. (Extended abstract)
- Quantum walks and search algorithms
- Quantum walks on graphs
- Secure threshold multi authority attribute based encryption without a central authority
- The Weil pairing, and its efficient calculation
- Traceable secret sharing and applications
- Verifiable \((t,n)\) threshold quantum secret sharing using \(d\)-dimensional Bell state
- \((t,n)\) threshold quantum secret sharing using the phase shift operation
This page was built for publication: Efficient quantum multi-authority attribute-based encryption and generalizations
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6629263)