Pages that link to "Item:Q5738892"
From MaRDI portal
The following pages link to Simplifying Design and Analysis of Complex Predicate Encryption Schemes (Q5738892):
Displaying 22 items.
- A bunch of broken schemes: a simple yet powerful linear approach to analyzing security of attribute-based encryption (Q826248) (← links)
- A new technique for compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption (Q1708030) (← links)
- Improved inner-product encryption with adaptive security and full attribute-hiding (Q1710620) (← links)
- Simple and efficient FE for quadratic functions (Q2043408) (← links)
- Tag-based ABE in prime-order groups via pair encoding (Q2043416) (← links)
- Compact adaptively secure ABE from \(k\)-Lin: beyond \(\mathsf{NC}^1\) and towards \(\mathsf{NL} \) (Q2055654) (← links)
- Adaptively secure ABE for DFA from \(k\)-Lin and more (Q2055655) (← links)
- Master-key KDM-secure ABE via predicate encoding (Q2061934) (← links)
- Generic negation of pair encodings (Q2061950) (← links)
- CCA-secure ABE using tag and pair encoding (Q2152061) (← links)
- Compact adaptively secure ABE for \(\mathsf{NC}^1\) from \(k\)-Lin (Q2188962) (← links)
- Fast, compact, and expressive attribute-based encryption (Q2234469) (← links)
- Compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption (Q2283046) (← links)
- A multi-authority approach to various predicate encryption types (Q2291666) (← links)
- Blind key-generation attribute-based encryption for general predicates (Q2673977) (← links)
- Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice (Q2678984) (← links)
- Unbounded dynamic predicate compositions in ABE from standard assumptions (Q2691592) (← links)
- Inner-product functional encryption with fine-grained access control (Q2691594) (← links)
- Decentralized multi-authority ABE for \(\mathsf{NC}^1\) from BDH (Q2697676) (← links)
- ABE for DFA from LWE against bounded collusions, revisited (Q2697861) (← links)
- Fast, Compact, and Expressive Attribute-Based Encryption (Q5041150) (← links)
- Match me if you can: matchmaking encryption and its applications (Q5918327) (← links)