Secure and Traceable Framework for Data Circulation
From MaRDI portal
Publication:2817476
DOI10.1007/978-3-319-40253-6_23zbMath1405.94072OpenAlexW2493173739MaRDI QIDQ2817476
Kaitai Liang, Atsuko Miyaji, Chun-hua Su
Publication date: 31 August 2016
Published in: Information Security and Privacy (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-40253-6_23
Cites Work
- New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques
- Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization
- Improved proxy re-encryption schemes with applications to secure distributed storage
- Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers
- Conjunctive, Subset, and Range Queries on Encrypted Data
- Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
- Attribute-Based Encryption with Fast Decryption
- Fully homomorphic encryption using ideal lattices
- Anonymity from Asymmetry: New Constructions for Anonymous HIBE
- Verifiable Delegation of Computation over Large Datasets
- Advances in Cryptology - EUROCRYPT 2004
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- Fuzzy Identity-Based Encryption
This page was built for publication: Secure and Traceable Framework for Data Circulation