The following pages link to Fuzzy Identity-Based Encryption (Q5385745):
Displaying 50 items.
- An efficient IBE scheme with tight security reduction in the random oracle model (Q264126) (← links)
- Cryptanalysis of a CP-ABE scheme with policy in normal forms (Q269743) (← links)
- Generalized closest substring encryption (Q300391) (← links)
- Blind attribute-based encryption and oblivious transfer with fine-grained access control (Q306333) (← links)
- On the security of joint signature and encryption revisited (Q350517) (← links)
- A provable secure fuzzy identity based signature scheme (Q362302) (← links)
- Fully secure revocable attribute-based encryption (Q407453) (← links)
- Attribute-based encryption schemes with constant-size ciphertexts (Q417988) (← links)
- Efficient bidirectional proxy re-encryption with direct chosen-ciphertext security (Q418306) (← links)
- Accountable authority key policy attribute-based encryption (Q439851) (← links)
- An efficient key-policy attribute-based encryption scheme with constant ciphertext length (Q474652) (← links)
- Strongly full-hiding inner product encryption (Q511916) (← links)
- Self-updatable encryption: time constrained access control with hidden attributes and better efficiency (Q511917) (← links)
- Computational friendly attribute-based encryptions with short ciphertext (Q512647) (← links)
- Directly revocable key-policy attribute-based encryption with verifiable ciphertext delegation (Q527147) (← links)
- Key updating technique in identity-based encryption (Q545363) (← links)
- Chosen ciphertext secure fuzzy identity based encryption without ROM (Q655101) (← links)
- Verifiability-based conversion from CPA to CCA-secure predicate encryption (Q683914) (← links)
- An expressive and provably secure ciphertext-policy attribute-based encryption (Q726482) (← links)
- Attribute-based key-insulated signature and its applications (Q726546) (← links)
- Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts (Q726568) (← links)
- SEMD: secure and efficient message dissemination with policy enforcement in VANET (Q736616) (← links)
- Forgeability of Wang-Zhu-Feng-Yau's attribute-based signature with policy-and-endorsement mechanism (Q744326) (← links)
- Attribute-based signcryption scheme based on linear codes (Q778458) (← links)
- Improvement of an outsourced attribute-based encryption scheme (Q780131) (← links)
- A decentralized multi-authority ciphertext-policy attribute-based encryption with mediated obfuscation (Q780319) (← links)
- Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes (Q781862) (← links)
- A bunch of broken schemes: a simple yet powerful linear approach to analyzing security of attribute-based encryption (Q826248) (← links)
- (In)security of concrete instantiation of Lin17's functional encryption scheme from noisy multilinear maps (Q831181) (← links)
- Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption (Q887451) (← links)
- Revocable hierarchical identity-based encryption via history-free approach (Q906383) (← links)
- Hidden attribute-based signatures without anonymity revocation (Q975862) (← links)
- Secure threshold multi authority attribute based encryption without a central authority (Q985083) (← links)
- Extensions of access structures and their cryptographic applications (Q989607) (← links)
- On the power of amortization in secret sharing: \(d\)-uniform secret sharing and CDS with constant information rate (Q1629415) (← links)
- Upgrading to functional encryption (Q1629441) (← links)
- Impossibility of simulation secure functional encryption even with random oracles (Q1629443) (← links)
- FE and iO for Turing machines from minimal assumptions (Q1631345) (← links)
- Unbounded ABE via bilinear entropy expansion, revisited (Q1648812) (← links)
- Anonymous IBE, leakage resilience and circular security from new assumptions (Q1648813) (← links)
- A novel model for lattice-based authorized searchable encryption with special keyword (Q1665334) (← links)
- A secure ciphertext self-destruction scheme with attribute-based encryption (Q1665383) (← links)
- Self-bilinear map on unknown order groups from indistinguishability obfuscation and its applications (Q1688406) (← links)
- Functional encryption for computational hiding in prime order groups via pair encodings (Q1692153) (← links)
- Succinct multi-authority attribute-based access control for circuits with authenticated outsourcing (Q1701978) (← links)
- Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing (Q1703692) (← links)
- Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage (Q1703703) (← links)
- A new technique for compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption (Q1708030) (← links)
- Improved inner-product encryption with adaptive security and full attribute-hiding (Q1710620) (← links)
- Decentralized multi-client functional encryption for inner product (Q1710623) (← links)