Access control encryption with efficient verifiable sanitized decryption
From MaRDI portal
Publication:2200529
DOI10.1016/J.INS.2018.06.068zbMath1441.94095OpenAlexW2809954982WikidataQ123189663 ScholiaQ123189663MaRDI QIDQ2200529
Ziyuan Hu, Huige Wang, Yu Long, Joseph K. Liu, Ke-Fei Chen
Publication date: 22 September 2020
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2018.06.068
Related Items (1)
Cites Work
- Unnamed Item
- Access control encryption for general policies from standard assumptions
- Leakage-Resilient Chosen-Ciphertext Secure Public-Key Encryption from Hash Proof System and One-Time Lossy Filter
- Functional Encryption with Bounded Collusions via Multi-party Computation
- Identity-Based Encryption Secure against Selective Opening Attack
- Functional Encryption: Definitions and Challenges
- Access Control Encryption: Enforcing Information Flow with Cryptography
- Predicate Encryption for Circuits from LWE
- Practical Identity-Based Encryption Without Random Oracles
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- Functional Encryption for Randomized Functionalities
- Fuzzy Identity-Based Encryption
- Attribute-based encryption for circuits
- Reusable garbled circuits and succinct functional encryption
- Access Control Encryption for Equality, Comparison, and More
- Functional Encryption: Deterministic to Randomized Functions from Simple Assumptions
- Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)
This page was built for publication: Access control encryption with efficient verifiable sanitized decryption