Pages that link to "Item:Q3519533"
From MaRDI portal
The following pages link to Delegating Capabilities in Predicate Encryption Systems (Q3519533):
Displaying 21 items.
- Anonymous spatial encryption under affine space delegation functionality with full security (Q506150) (← links)
- Self-updatable encryption: time constrained access control with hidden attributes and better efficiency (Q511917) (← links)
- Efficient selective identity-based encryption without random oracles (Q656924) (← links)
- Revocable hierarchical identity-based encryption with shorter private keys and update keys (Q1671645) (← links)
- Identity-based encryption with outsourced equality test in cloud computing (Q1750514) (← links)
- Fully secure functional encryption with a large class of relations from the decisional linear assumption (Q2010596) (← links)
- Delegation-based conversion from CPA to CCA-secure predicate encryption (Q2019836) (← links)
- Master-key KDM-secure ABE via predicate encoding (Q2061934) (← links)
- Adaptive-secure identity-based inner-product functional encryption and its leakage-resilience (Q2152060) (← links)
- Anonymous HIBE with short ciphertexts: full security in prime order groups (Q2256104) (← links)
- Improved hidden vector encryption with short ciphertexts and tokens (Q2430414) (← links)
- The relation and transformation between hierarchical inner product encryption and spatial encryption (Q2448081) (← links)
- Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption (Q2948190) (← links)
- Transforming Hidden Vector Encryption Schemes from Composite to Prime Order Groups (Q2988340) (← links)
- Anonymous Encryption with Partial-Order Subset Delegation Functionality (Q3092355) (← links)
- Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application to Searchable Encryption in Multi-user Setting (Q3104695) (← links)
- New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts (Q3408210) (← links)
- Compact hierarchical identity-based encryption based on a harder decisional problem (Q5259051) (← links)
- Match me if you can: matchmaking encryption and its applications (Q5918327) (← links)
- Tightly secure hierarchical identity-based encryption (Q5919017) (← links)
- A survey on functional encryption (Q6163797) (← links)