Pages that link to "Item:Q3003402"
From MaRDI portal
The following pages link to Unbounded HIBE and Attribute-Based Encryption (Q3003402):
Displaying 50 items.
- Anonymous spatial encryption under affine space delegation functionality with full security (Q506150) (← links)
- Self-updatable encryption: time constrained access control with hidden attributes and better efficiency (Q511917) (← links)
- Computational friendly attribute-based encryptions with short ciphertext (Q512647) (← links)
- Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts (Q726568) (← links)
- Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes (Q781862) (← links)
- Key continual-leakage resilient broadcast cryptosystem from dual system in broadcast networks (Q893862) (← links)
- Revocable hierarchical identity-based encryption via history-free approach (Q906383) (← links)
- Unbounded ABE via bilinear entropy expansion, revisited (Q1648812) (← links)
- Revocable hierarchical identity-based encryption with shorter private keys and update keys (Q1671645) (← links)
- A new technique for compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption (Q1708030) (← links)
- Fully secure functional encryption with a large class of relations from the decisional linear assumption (Q2010596) (← links)
- Revocable hierarchical identity-based encryption (Q2015131) (← links)
- Adaptively secure revocable hierarchical IBE from \(k\)-linear assumption (Q2035455) (← links)
- Tag-based ABE in prime-order groups via pair encoding (Q2043416) (← links)
- Compact adaptively secure ABE from \(k\)-Lin: beyond \(\mathsf{NC}^1\) and towards \(\mathsf{NL} \) (Q2055654) (← links)
- Adaptively secure ABE for DFA from \(k\)-Lin and more (Q2055655) (← links)
- Decentralized multi-authority \textbf{\textsf{ABE}} for \textbf{\textsf{DNF}}s from \textbf{\textsf{LWE}} (Q2056681) (← links)
- Fully secure ABE with outsourced decryption against chosen ciphertext attack (Q2057133) (← links)
- Master-key KDM-secure ABE via predicate encoding (Q2061934) (← links)
- Generic negation of pair encodings (Q2061950) (← links)
- Functional encryption for attribute-weighted sums from \(k\)-Lin (Q2096503) (← links)
- Simpler constructions of asymmetric primitives from obfuscation (Q2152062) (← links)
- Verifiable fully outsourced attribute-based signcryption system for IoT eHealth big data in cloud computing (Q2160720) (← links)
- Generic constructions for fully secure revocable attribute-based encryption (Q2167729) (← links)
- Attribute based encryption for deterministic finite automata from DLIN (Q2175933) (← links)
- Compact adaptively secure ABE for \(\mathsf{NC}^1\) from \(k\)-Lin (Q2188962) (← links)
- Key-policy attribute-based encryption against continual auxiliary input leakage (Q2200658) (← links)
- Hierarchical attribute based encryption with continuous leakage-resilience (Q2213099) (← links)
- Efficient identity-based encryption with hierarchical key-insulation from HIBE (Q2232128) (← links)
- Anonymous HIBE with short ciphertexts: full security in prime order groups (Q2256104) (← links)
- A general framework for secure sharing of personal health records in cloud system (Q2403233) (← links)
- Extended dual system group and shorter unbounded hierarchical identity based encryption (Q2630713) (← links)
- Blind key-generation attribute-based encryption for general predicates (Q2673977) (← links)
- Cryptanalysis of Boyen's attribute-based encryption scheme in TCC 2013 (Q2673979) (← links)
- Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice (Q2678984) (← links)
- Unbounded dynamic predicate compositions in ABE from standard assumptions (Q2691592) (← links)
- Unbounded HIBE with tight security (Q2692379) (← links)
- Decentralized multi-authority ABE for \(\mathsf{NC}^1\) from BDH (Q2697676) (← links)
- Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings (Q2790032) (← links)
- Revocable Hierarchical Identity-Based Encryption: History-Free Update, Security Against Insiders, and Short Ciphertexts (Q2790033) (← links)
- A Study of Pair Encodings: Predicate Encryption in Prime Order Groups (Q2799098) (← links)
- Leakage-Resilient Functional Encryption via Pair Encodings (Q2817484) (← links)
- Accountable Large-Universe Attribute-Based Encryption Supporting Any Monotone Access Structures (Q2817489) (← links)
- Attribute Based Encryption with Direct Efficiency Tradeoff (Q2822674) (← links)
- Turing Machines with Shortcuts: Efficient Attribute-Based Encryption for Bounded Functions (Q2822675) (← links)
- Circuit-ABE from LWE: Unbounded Attributes and Semi-adaptive Security (Q2829953) (← links)
- Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption (Q2948190) (← links)
- Dual System Encryption Framework in Prime-Order Groups via Computational Pair Encodings (Q2953790) (← links)
- Déjà Q All Over Again: Tighter and Broader Reductions of q-Type Assumptions (Q2953792) (← links)
- Expanded Framework for Dual System Encryption and Its Application (Q2988343) (← links)