Secure threshold multi authority attribute based encryption without a central authority
From MaRDI portal
(Redirected from Publication:985083)
Recommendations
- Secure Threshold Multi Authority Attribute Based Encryption without a Central Authority
- Multi-authority attribute-based encryption with honest-but-curious central authority
- Multi-authority Attribute Based Encryption
- scientific article; zbMATH DE number 6985624
- Fully secure multi-authority ciphertext-policy attribute-based encryption without random oracles
Cites work
- scientific article; zbMATH DE number 1302840 (Why is no real title available?)
- scientific article; zbMATH DE number 1031003 (Why is no real title available?)
- A novel ID-based designated verifier signature scheme
- A secure identity-based proxy multi-signature scheme
- An improved identity-based key agreement protocol and its security proof
- Bounded Ciphertext Policy Attribute Based Encryption
- Fuzzy Identity-Based Encryption
- Identity-based cryptosystems and signature schemes
- Multi-authority Attribute Based Encryption
- Robust threshold DSS signatures
- Secure distributed key generation for discrete-log based cryptosystems
- Security weakness in a three-party pairing-based protocol for password authenticated key exchange
Cited in
(14)- Secure Threshold Multi Authority Attribute Based Encryption without a Central Authority
- Fine-grained searchable encryption in multi-user setting
- Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts
- Fuzzy matching: multi-authority attribute searchable encryption without central authority
- Key-policy multi-authority attribute-based encryption
- Hierarchical and non-monotonic key-policy attribute-based encryption and its application
- Decentralizing attribute-based encryption
- Multi-authority attribute-based encryption with honest-but-curious central authority
- Multi-authority ABE for non-monotonic access structures
- Bandwidth-efficient attribute-based key-insulated signatures with message recovery
- Directly revocable key-policy attribute-based encryption with verifiable ciphertext delegation
- Efficient quantum multi-authority attribute-based encryption and generalizations
- Multi-authority Attribute Based Encryption
- A survey on functional encryption
This page was built for publication: Secure threshold multi authority attribute based encryption without a central authority
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q985083)