Pages that link to "Item:Q3596401"
From MaRDI portal
The following pages link to Multi-authority Attribute Based Encryption (Q3596401):
Displayed 50 items.
- Generalized closest substring encryption (Q300391) (← links)
- Attribute-based encryption schemes with constant-size ciphertexts (Q417988) (← links)
- Self-updatable encryption: time constrained access control with hidden attributes and better efficiency (Q511917) (← links)
- Computational friendly attribute-based encryptions with short ciphertext (Q512647) (← links)
- Directly revocable key-policy attribute-based encryption with verifiable ciphertext delegation (Q527147) (← links)
- Chosen ciphertext secure fuzzy identity based encryption without ROM (Q655101) (← links)
- Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts (Q726568) (← links)
- Forgeability of Wang-Zhu-Feng-Yau's attribute-based signature with policy-and-endorsement mechanism (Q744326) (← links)
- A decentralized multi-authority ciphertext-policy attribute-based encryption with mediated obfuscation (Q780319) (← links)
- A bunch of broken schemes: a simple yet powerful linear approach to analyzing security of attribute-based encryption (Q826248) (← links)
- Hidden attribute-based signatures without anonymity revocation (Q975862) (← links)
- Secure threshold multi authority attribute based encryption without a central authority (Q985083) (← links)
- Succinct multi-authority attribute-based access control for circuits with authenticated outsourcing (Q1701978) (← links)
- Fuzzy matching and direct revocation: a new CP-ABE scheme from multilinear maps (Q1797829) (← links)
- Attribute-based fuzzy identity access control in multicloud computing environments (Q1800244) (← links)
- Decentralized multi-authority \textbf{\textsf{ABE}} for \textbf{\textsf{DNF}}s from \textbf{\textsf{LWE}} (Q2056681) (← links)
- Efficient fully CCA-secure predicate encryptions from pair encodings (Q2070257) (← links)
- Decentralized policy-hiding ABE with receiver privacy (Q2167764) (← links)
- Key-policy attribute-based encryption against continual auxiliary input leakage (Q2200658) (← links)
- Security-level switchable attribute-based encryption under the strictly weaker assumption family (Q2212065) (← links)
- Escrow free attribute-based signature with self-revealability (Q2282038) (← links)
- A multi-authority approach to various predicate encryption types (Q2291666) (← links)
- Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing (Q2292920) (← links)
- A general framework for secure sharing of personal health records in cloud system (Q2403233) (← links)
- Provably secure role-based encryption with revocation mechanism (Q2434543) (← links)
- A survey of lattice based expressive attribute based encryption (Q2668411) (← links)
- Privacy-preserving resource sharing using permissioned blockchains (the case of smart neighbourhood) (Q2670868) (← links)
- Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice (Q2678984) (← links)
- Decentralized multi-authority ABE for \(\mathsf{NC}^1\) from BDH (Q2697676) (← links)
- Multi-party functional encryption (Q2697858) (← links)
- Multi-authority attribute-based encryption with honest-but-curious central authority (Q2887037) (← links)
- Key-Policy Multi-authority Attribute-Based Encryption (Q2947155) (← links)
- Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption (Q2948190) (← links)
- Expanded Framework for Dual System Encryption and Its Application (Q2988343) (← links)
- Attribute-Based Signatures (Q3073718) (← links)
- Efficient Ciphertext Policy Attribute-Based Encryption with Constant-Size Ciphertext and Constant Computation-Cost (Q3092350) (← links)
- Revocable Decentralized Multi-Authority Functional Encryption (Q3179488) (← links)
- Distributed Multi-authority Attribute-Based Encryption Using Cellular Automata (Q3297637) (← links)
- Conjunctive Broadcast and Attribute-Based Encryption (Q3392916) (← links)
- Bilinear Entropy Expansion from the Decisional Linear Assumption (Q3457083) (← links)
- Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures (Q3506405) (← links)
- Security and Anonymity of Identity-Based Encryption with Multiple Trusted Authorities (Q3600515) (← links)
- Functional Encryption: Origins and Recent Developments (Q4916000) (← links)
- Decentralized Attribute-Based Signatures (Q4916005) (← links)
- A PROOF OF SECURITY FOR A KEY-POLICY RS-ABE SCHEME (Q5229551) (← links)
- A Fuzzy ID-Based Encryption Efficient When Error Rate Is Low (Q5504617) (← links)
- Secure Threshold Multi Authority Attribute Based Encryption without a Central Authority (Q5504641) (← links)
- Simplifying Design and Analysis of Complex Predicate Encryption Schemes (Q5738892) (← links)
- Match me if you can: matchmaking encryption and its applications (Q5918327) (← links)
- Bounded-collusion decentralized ABE with sublinear parameters (Q6040630) (← links)