Pages that link to "Item:Q3563830"
From MaRDI portal
The following pages link to Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption (Q3563830):
Displaying 50 items.
- Generalized closest substring encryption (Q300391) (← links)
- On the security of joint signature and encryption revisited (Q350517) (← links)
- Spatial encryption supporting non-monotone access structure (Q404924) (← links)
- New results and applications for multi-secret sharing schemes (Q404940) (← links)
- Shorter identity-based encryption via asymmetric pairings (Q404944) (← links)
- Fully secure revocable attribute-based encryption (Q407453) (← links)
- Attribute-based encryption schemes with constant-size ciphertexts (Q417988) (← links)
- Accountable authority key policy attribute-based encryption (Q439851) (← links)
- Anonymous spatial encryption under affine space delegation functionality with full security (Q506150) (← links)
- Strongly full-hiding inner product encryption (Q511916) (← links)
- Self-updatable encryption: time constrained access control with hidden attributes and better efficiency (Q511917) (← links)
- Computational friendly attribute-based encryptions with short ciphertext (Q512647) (← links)
- An algebraic framework for Diffie-Hellman assumptions (Q514473) (← links)
- Verifiability-based conversion from CPA to CCA-secure predicate encryption (Q683914) (← links)
- An expressive and provably secure ciphertext-policy attribute-based encryption (Q726482) (← links)
- Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts (Q726568) (← links)
- SEMD: secure and efficient message dissemination with policy enforcement in VANET (Q736616) (← links)
- A decentralized multi-authority ciphertext-policy attribute-based encryption with mediated obfuscation (Q780319) (← links)
- Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes (Q781862) (← links)
- Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption (Q887451) (← links)
- Efficient subtree-based encryption for fuzzy-entity data sharing (Q1626290) (← links)
- Unbounded ABE via bilinear entropy expansion, revisited (Q1648812) (← links)
- A novel model for lattice-based authorized searchable encryption with special keyword (Q1665334) (← links)
- Functional encryption for computational hiding in prime order groups via pair encodings (Q1692153) (← links)
- Succinct multi-authority attribute-based access control for circuits with authenticated outsourcing (Q1701978) (← links)
- Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing (Q1703692) (← links)
- A new technique for compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption (Q1708030) (← links)
- Adaptively simulation-secure attribute-hiding predicate encryption (Q1710619) (← links)
- Improved inner-product encryption with adaptive security and full attribute-hiding (Q1710620) (← links)
- A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system (Q1791671) (← links)
- Fuzzy matching and direct revocation: a new CP-ABE scheme from multilinear maps (Q1797829) (← links)
- Relations between semantic security and anonymity in identity-based encryption (Q1944921) (← links)
- Research on ciphertext-policy attribute-based encryption with attribute level user revocation in cloud storage (Q1992717) (← links)
- Revocable attribute-based encryption with decryption key exposure resistance and ciphertext delegation (Q2004746) (← links)
- Predicate signatures from pair encodings via dual system proof technique (Q2009416) (← links)
- Fully secure functional encryption with a large class of relations from the decisional linear assumption (Q2010596) (← links)
- Tag-based ABE in prime-order groups via pair encoding (Q2043416) (← links)
- Compact adaptively secure ABE from \(k\)-Lin: beyond \(\mathsf{NC}^1\) and towards \(\mathsf{NL} \) (Q2055654) (← links)
- Tightly CCA-secure inner product functional encryption scheme (Q2055966) (← links)
- Decentralized multi-authority \textbf{\textsf{ABE}} for \textbf{\textsf{DNF}}s from \textbf{\textsf{LWE}} (Q2056681) (← links)
- Fully secure ABE with outsourced decryption against chosen ciphertext attack (Q2057133) (← links)
- Chosen ciphertext attacks secure inner-product functional encryption from learning with errors assumption (Q2057139) (← links)
- Efficient fully CCA-secure predicate encryptions from pair encodings (Q2070257) (← links)
- Revocable policy-based chameleon hash (Q2146158) (← links)
- Server-aided revocable attribute-based encryption revised: multi-user setting and fully secure (Q2148758) (← links)
- CCA-secure ABE using tag and pair encoding (Q2152061) (← links)
- Verifiable fully outsourced attribute-based signcryption system for IoT eHealth big data in cloud computing (Q2160720) (← links)
- Predicate encryption from bilinear maps and one-sided probabilistic rank (Q2175910) (← links)
- Attribute based encryption for deterministic finite automata from DLIN (Q2175933) (← links)
- Compact adaptively secure ABE for \(\mathsf{NC}^1\) from \(k\)-Lin (Q2188962) (← links)