Cross-domain attribute-based access control encryption
From MaRDI portal
Publication:2149810
DOI10.1007/978-3-030-92548-2_1zbMath1496.68075OpenAlexW4205233727MaRDI QIDQ2149810
Publication date: 29 June 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-92548-2_1
ciphertext-policy attribute-based encryptionnon-interactive zero-knowledge proofsstructure-preserving signatureaccess control encryption
Modes of computation (nondeterministic, parallel, interactive, probabilistic, etc.) (68Q10) Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62) Computer security (68M25)
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Access control encryption from group encryption
- Access control encryption for general policies from standard assumptions
- Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits
- Attribute-Based Encryption for Circuits from Multilinear Maps
- Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption
- Decentralizing Attribute-Based Encryption
- Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization
- Access Control Encryption: Enforcing Information Flow with Cryptography
- Functional Encryption for Inner Product: Achieving Constant-Size Ciphertexts with Adaptive Security or Support for Negation
- Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems
- The Knowledge Complexity of Interactive Proof Systems
- Fuzzy Identity-Based Encryption
- Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products
- Access Control Encryption for Equality, Comparison, and More
- Unified, Minimal and Selectively Randomizable Structure-Preserving Signatures
- On lattices, learning with errors, random linear codes, and cryptography
This page was built for publication: Cross-domain attribute-based access control encryption