Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts
From MaRDI portal
Publication:726568
DOI10.1016/J.INS.2014.01.035zbMATH Open1341.68043OpenAlexW2088645726WikidataQ121070517 ScholiaQ121070517MaRDI QIDQ726568FDOQ726568
Authors: Hua Deng, Qianhong Wu, Bo Qin, Josep Domingo-Ferrer, Lei Zhang, Wenchang Shi, Jianwei Liu
Publication date: 11 July 2016
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2014.01.035
Recommendations
- Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization
- Attribute-based encryption schemes
- Attribute-based encryption
- An expressive and provably secure ciphertext-policy attribute-based encryption
- Efficient ciphertext policy attribute-based encryption with constant-size ciphertext and constant computation-cost
Cites Work
- Theory of Cryptography
- Identity-based cryptosystems and signature schemes
- Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization
- Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
- New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
- Title not available (Why is that?)
- Title not available (Why is that?)
- Efficient Identity-Based Encryption Without Random Oracles
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- Fuzzy Identity-Based Encryption
- Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption
- Fully secure functional encryption with general relations from the decisional linear assumption
- Multi-authority Attribute Based Encryption
- Hierarchical Predicate Encryption for Inner-Products
- Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products
- Multi-use and unidirectional identity-based proxy re-encryption schemes
- Identity-Based Proxy Re-encryption
- Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption
- Bounded Ciphertext Policy Attribute Based Encryption
- Provably secure one-round identity-based authenticated asymmetric group key agreement protocol
- Forward-secure identity-based signature: security notions and construction
- Provably secure threshold public-key encryption with adaptive security and short ciphertexts
- Unbounded HIBE and Attribute-Based Encryption
- Attribute-based encryption with fast decryption
- Secure threshold multi authority attribute based encryption without a central authority
- Key updating technique in identity-based encryption
Cited In (21)
- Hierarchical attribute based encryption with continuous leakage-resilience
- Cost-effective and scalable data sharing in cloud storage using hierarchical attribute-based encryption with forward security
- Security-level switchable attribute-based encryption under the strictly weaker assumption family
- Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing
- A survey on functional encryption
- Hierarchical identity-based inner product functional encryption
- Attribute-based encryption
- Attribute-based encryption
- Computationally Efficient Dual-Policy Attribute Based Encryption with Short Ciphertext
- Ciphertext-Policy Attribute-Based Broadcast Encryption with Small Keys
- Hierarchical and non-monotonic key-policy attribute-based encryption and its application
- Flexible attribute-based proxy re-encryption for efficient data sharing
- How to share a secret
- An identity-based encryption technique using subtree for fuzzy user data sharing under cloud computing environment
- Secure independent-update concise-expression access control for video on demand in cloud
- Title not available (Why is that?)
- Efficient subtree-based encryption for fuzzy-entity data sharing
- Attribute-based encryption schemes
- A fully distributed hierarchical attribute-based encryption scheme
- Practical large universe attribute-set based encryption in the standard model
- Directly revocable key-policy attribute-based encryption with verifiable ciphertext delegation
This page was built for publication: Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q726568)