Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts
From MaRDI portal
Publication:726568
DOI10.1016/j.ins.2014.01.035zbMath1341.68043OpenAlexW2088645726WikidataQ121070517 ScholiaQ121070517MaRDI QIDQ726568
Josep Domingo-Ferrer, Wenchang Shi, Lei Zhang, Qianhong Wu, Bo Qin, Hua Deng, Jian-wei Liu
Publication date: 11 July 2016
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2014.01.035
Related Items
Efficient subtree-based encryption for fuzzy-entity data sharing, Hierarchical identity-based inner product functional encryption, A survey on functional encryption, Hierarchical and non-monotonic key-policy attribute-based encryption and its application, Security-level switchable attribute-based encryption under the strictly weaker assumption family, Hierarchical attribute based encryption with continuous leakage-resilience, Practical Large Universe Attribute-Set Based Encryption in the Standard Model, Cost-Effective and Scalable Data Sharing in Cloud Storage Using Hierarchical Attribute-Based Encryption with Forward Security, Directly revocable key-policy attribute-based encryption with verifiable ciphertext delegation, Flexible attribute-based proxy re-encryption for efficient data sharing, How to share a secret, Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing, Secure independent-update concise-expression access control for video on demand in cloud, A fully distributed hierarchical attribute-based encryption scheme, An identity-based encryption technique using subtree for fuzzy user data sharing under cloud computing environment
Cites Work
- Unnamed Item
- Unnamed Item
- Provably secure one-round identity-based authenticated asymmetric group key agreement protocol
- Provably secure threshold public-key encryption with adaptive security and short ciphertexts
- Key updating technique in identity-based encryption
- Forward-secure identity-based signature: security notions and construction
- Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption
- Secure threshold multi authority attribute based encryption without a central authority
- Multi-use and unidirectional identity-based proxy re-encryption schemes
- Identity-Based Cryptosystems and Signature Schemes
- Unbounded HIBE and Attribute-Based Encryption
- Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization
- Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
- New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
- Bounded Ciphertext Policy Attribute Based Encryption
- Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
- Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption
- Multi-authority Attribute Based Encryption
- Identity-Based Proxy Re-encryption
- Hierarchical Predicate Encryption for Inner-Products
- Attribute-Based Encryption with Fast Decryption
- Efficient Identity-Based Encryption Without Random Oracles
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- Fuzzy Identity-Based Encryption
- Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products
- Theory of Cryptography