Pages that link to "Item:Q3084340"
From MaRDI portal
The following pages link to Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization (Q3084340):
Displaying 50 items.
- Self-updatable encryption with short public parameters and its extensions (Q264135) (← links)
- Cryptanalysis of a CP-ABE scheme with policy in normal forms (Q269743) (← links)
- Secret-sharing schemes for very dense graphs (Q290386) (← links)
- Blind attribute-based encryption and oblivious transfer with fine-grained access control (Q306333) (← links)
- On the security of joint signature and encryption revisited (Q350517) (← links)
- Spatial encryption supporting non-monotone access structure (Q404924) (← links)
- Fully secure revocable attribute-based encryption (Q407453) (← links)
- Attribute-based encryption schemes with constant-size ciphertexts (Q417988) (← links)
- Accountable authority key policy attribute-based encryption (Q439851) (← links)
- An efficient key-policy attribute-based encryption scheme with constant ciphertext length (Q474652) (← links)
- Security and efficiency data sharing scheme for cloud storage (Q508206) (← links)
- Self-updatable encryption: time constrained access control with hidden attributes and better efficiency (Q511917) (← links)
- Computational friendly attribute-based encryptions with short ciphertext (Q512647) (← links)
- Directly revocable key-policy attribute-based encryption with verifiable ciphertext delegation (Q527147) (← links)
- Verifiability-based conversion from CPA to CCA-secure predicate encryption (Q683914) (← links)
- An expressive and provably secure ciphertext-policy attribute-based encryption (Q726482) (← links)
- Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts (Q726568) (← links)
- SEMD: secure and efficient message dissemination with policy enforcement in VANET (Q736616) (← links)
- Forgeability of Wang-Zhu-Feng-Yau's attribute-based signature with policy-and-endorsement mechanism (Q744326) (← links)
- Attribute-based signcryption scheme based on linear codes (Q778458) (← links)
- Improvement of an outsourced attribute-based encryption scheme (Q780131) (← links)
- A decentralized multi-authority ciphertext-policy attribute-based encryption with mediated obfuscation (Q780319) (← links)
- Blocked linear secret sharing scheme for scalable attribute based encryption in manageable cloud storage system (Q781154) (← links)
- Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes (Q781862) (← links)
- A bunch of broken schemes: a simple yet powerful linear approach to analyzing security of attribute-based encryption (Q826248) (← links)
- Extensions of access structures and their cryptographic applications (Q989607) (← links)
- A novel model for lattice-based authorized searchable encryption with special keyword (Q1665334) (← links)
- Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing (Q1703692) (← links)
- A new technique for compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption (Q1708030) (← links)
- Improved inner-product encryption with adaptive security and full attribute-hiding (Q1710620) (← links)
- Adaptable key-policy attribute-based encryption with time interval (Q1741937) (← links)
- Publicly verifiable searchable symmetric encryption based on efficient cryptographic components (Q1755999) (← links)
- Attribute-based fuzzy identity access control in multicloud computing environments (Q1800244) (← links)
- Expressive attribute-based keyword search with constant-size ciphertext (Q1800303) (← links)
- An efficient attribute-based access control system with break-glass capability for cloud-assisted industrial control system (Q1984098) (← links)
- Research on ciphertext-policy attribute-based encryption with attribute level user revocation in cloud storage (Q1992717) (← links)
- Fully secure functional encryption with a large class of relations from the decisional linear assumption (Q2010596) (← links)
- Optimal broadcast encryption from pairings and LWE (Q2055600) (← links)
- Lower bounds for leakage-resilient secret sharing (Q2055623) (← links)
- Decentralized multi-authority \textbf{\textsf{ABE}} for \textbf{\textsf{DNF}}s from \textbf{\textsf{LWE}} (Q2056681) (← links)
- Fully secure ABE with outsourced decryption against chosen ciphertext attack (Q2057133) (← links)
- Efficient fully CCA-secure predicate encryptions from pair encodings (Q2070257) (← links)
- Upslices, downslices, and secret-sharing with complexity of \(1.5^n\) (Q2129013) (← links)
- Cross-domain attribute-based access control encryption (Q2149810) (← links)
- Adaptive-secure identity-based inner-product functional encryption and its leakage-resilience (Q2152060) (← links)
- Adaptively secure laconic function evaluation for \(\mathsf{NC}^1\) (Q2152174) (← links)
- Key-policy attribute-based encryption against continual auxiliary input leakage (Q2200658) (← links)
- Hierarchical attribute based encryption with continuous leakage-resilience (Q2213099) (← links)
- Efficient anonymous multi-group broadcast encryption (Q2229276) (← links)
- Extremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verification (Q2232597) (← links)