Generic constructions for fully secure revocable attribute-based encryption
From MaRDI portal
Publication:2167729
DOI10.1007/978-3-319-66399-9_29OpenAlexW2744430813MaRDI QIDQ2167729
Kotoko Yamada, Nuttapong Attrapadung, Goichiro Hanaoka, Keita Emura, Keisuke Tanaka
Publication date: 25 August 2022
Full work available at URL: https://doi.org/10.1007/978-3-319-66399-9_29
attribute-based encryption (ABE)full securitypair encodingidentity-based revocation (IBR)revocable ABE
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Computer security (68M25)
Related Items
A practical compiler for attribute-based encryption: new decentralized constructions and more ⋮ Server-Aided Directly Revocable Ciphertext-Policy Attribute-Based Encryption with Verifiable Delegation
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Fully secure revocable attribute-based encryption
- Directly revocable key-policy attribute-based encryption with verifiable ciphertext delegation
- General circuit realizing compact revocable attribute-based encryption from multilinear maps
- Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings
- A Study of Pair Encodings: Predicate Encryption in Prime Order Groups
- A Framework for Identity-Based Encryption with Almost Tight Security
- Adaptively Secure Unrestricted Attribute-Based Encryption with Subset Difference Revocation in Bilinear Groups of Prime Order
- An Algebraic Framework for Diffie-Hellman Assumptions
- Functional Encryption for Regular Languages
- Dual System Encryption Framework in Prime-Order Groups via Computational Pair Encodings
- Identity-Based Cryptosystems and Signature Schemes
- Unbounded HIBE and Attribute-Based Encryption
- Public Key Broadcast Encryption for Stateless Receivers
- Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts
- Conjunctive Broadcast and Attribute-Based Encryption
- Functional Encryption for Inner Product: Achieving Constant-Size Ciphertexts with Adaptive Security or Support for Negation
- Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption
- Generalized Identity Based and Broadcast Encryption Schemes
- Attribute-Based Encryption Supporting Direct/Indirect Revocation Modes
- Hierarchical ID-Based Cryptography
- Fully Secure Unbounded Inner-Product and Attribute-Based Encryption
- Revocable Identity-Based Encryption Revisited: Security Model and Construction
- Fuzzy Identity-Based Encryption
- Dual System Encryption via Doubly Selective Security: Framework, Fully Secure Functional Encryption for Regular Languages, and More
This page was built for publication: Generic constructions for fully secure revocable attribute-based encryption