Extensions of access structures and their cryptographic applications
From MaRDI portal
Publication:989607
DOI10.1007/s00200-010-0125-1zbMath1195.14034OpenAlexW2096003837MaRDI QIDQ989607
Paz Morillo, Vanesa Daza, Javier Herranz, Carla Ràfols
Publication date: 23 August 2010
Published in: Applicable Algebra in Engineering, Communication and Computing (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00200-010-0125-1
Data encryption (aspects in computer science) (68P25) Other types of codes (94B60) Applications to coding theory and cryptography of arithmetic geometry (14G50)
Related Items (1)
Cites Work
- Unnamed Item
- Hierarchical threshold secret sharing
- Multipartite secret sharing by bivariate interpolation
- Secret sharing schemes with bipartite access structure
- How to share a secret
- Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization
- CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts
- On Secret Sharing Schemes, Matroids and Polymatroids
- Dynamic Threshold Public-Key Encryption
- Characterizing Ideal Weighted Threshold Secret Sharing
- A public key cryptosystem and a signature scheme based on discrete logarithms
- An Efficient threshold Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack (Extended Abstract)
- Identity-Based Encryption from the Weil Pairing
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - EUROCRYPT 2004
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- Fuzzy Identity-Based Encryption
- Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys
- Topics in Cryptology – CT-RSA 2006
This page was built for publication: Extensions of access structures and their cryptographic applications