Pages that link to "Item:Q3506405"
From MaRDI portal
The following pages link to Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures (Q3506405):
Displaying 20 items.
- Blind attribute-based encryption and oblivious transfer with fine-grained access control (Q306333) (← links)
- A novel model for lattice-based authorized searchable encryption with special keyword (Q1665334) (← links)
- Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage (Q1703703) (← links)
- Fine-grained searchable encryption in multi-user setting (Q1741938) (← links)
- Privacy-enhanced attribute-based private information retrieval (Q2195304) (← links)
- Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing (Q2292920) (← links)
- Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice (Q2678984) (← links)
- Secret Handshakes with Dynamic Expressive Matching Policy (Q2817485) (← links)
- Ciphertext-Policy Attribute-Based Encryption with Key-Delegation Abuse Resistance (Q2817487) (← links)
- Accountable Large-Universe Attribute-Based Encryption Supporting Any Monotone Access Structures (Q2817489) (← links)
- An Efficient and Expressive Ciphertext-Policy Attribute-Based Encryption Scheme with Partially Hidden Access Structures (Q2953846) (← links)
- Ciphertext-Policy Attribute Based Encryption Supporting Access Policy Update (Q2953847) (← links)
- Fully Secure Hidden Ciphertext-Policy Attribute-Based Proxy Re-encryption (Q3297496) (← links)
- Privacy-Aware Attribute-Based Encryption with User Accountability (Q3399216) (← links)
- Defending against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems (Q3556625) (← links)
- Attribute-Based Encryption (Q5050197) (← links)
- On the Security of a Searchable Anonymous Attribute Based Encryption (Q5114977) (← links)
- DMU-ABSE: Dynamic Multi-user Attribute-Based Searchable Encryption with File Deletion and User Revocation (Q5216981) (← links)
- Match me if you can: matchmaking encryption and its applications (Q5918327) (← links)
- Adaptive oblivious transfer with access control from lattice assumptions (Q5919120) (← links)