Extensions of access structures and their cryptographic applications
DOI10.1007/S00200-010-0125-1zbMATH Open1195.14034OpenAlexW2096003837MaRDI QIDQ989607FDOQ989607
Authors: Vanesa Daza, Javier Herranz, Paz Morillo, Carla Ràfols
Publication date: 23 August 2010
Published in: Applicable Algebra in Engineering, Communication and Computing (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00200-010-0125-1
Recommendations
Data encryption (aspects in computer science) (68P25) Applications to coding theory and cryptography of arithmetic geometry (14G50) Other types of codes (94B60)
Cites Work
- How to share a secret
- Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization
- A public key cryptosystem and a signature scheme based on discrete logarithms
- Identity-Based Encryption from the Weil Pairing
- Advances in Cryptology - EUROCRYPT 2004
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- Fuzzy Identity-Based Encryption
- CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts
- Dynamic Threshold Public-Key Encryption
- An Efficient threshold Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack (Extended Abstract)
- Topics in Cryptology – CT-RSA 2006
- Secret sharing schemes with bipartite access structure
- Title not available (Why is that?)
- On Secret Sharing Schemes, Matroids and Polymatroids
- Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys
- Advances in Cryptology - EUROCRYPT 2004
- Multipartite secret sharing by bivariate interpolation
- Characterizing Ideal Weighted Threshold Secret Sharing
- Hierarchical threshold secret sharing
Cited In (4)
This page was built for publication: Extensions of access structures and their cryptographic applications
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q989607)