Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption
From MaRDI portal
Publication:2914261
DOI10.1007/978-3-642-32009-5_13zbMath1296.94139OpenAlexW162787226MaRDI QIDQ2914261
Hakan Seyalioglu, Amit Sahai, Brent Waters
Publication date: 25 September 2012
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-32009-5_13
Related Items (31)
Self-updatable encryption with short public parameters and its extensions ⋮ Generalized closest substring encryption ⋮ Revocable Decentralized Multi-Authority Functional Encryption ⋮ Revocable policy-based chameleon hash ⋮ Server-aided revocable attribute-based encryption revised: multi-user setting and fully secure ⋮ Efficient revocable identity-based encryption via subset difference methods ⋮ A general framework for secure sharing of personal health records in cloud system ⋮ Quantum attribute-based encryption: a comprehensive study ⋮ Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice ⋮ Unconditionally Secure Revocable Storage: Tight Bounds, Optimal Construction, and Robustness ⋮ GLUE: generalizing unbounded attribute-based encryption for flexible efficiency trade-offs ⋮ Functional encryption with secure key leasing ⋮ Generic construction of trace-and-revoke inner product functional encryption ⋮ (Dual) server-aided revocable attribute-based encryption with decryption key exposure resistance ⋮ An efficient and revocable storage CP-ABE scheme in the cloud computing ⋮ Server-Aided Directly Revocable Ciphertext-Policy Attribute-Based Encryption with Verifiable Delegation ⋮ Cost-Effective and Scalable Data Sharing in Cloud Storage Using Hierarchical Attribute-Based Encryption with Forward Security ⋮ An efficient attribute-based access control system with break-glass capability for cloud-assisted industrial control system ⋮ Efficient computation outsourcing for inverting a class of homomorphic functions ⋮ Self-updatable encryption: time constrained access control with hidden attributes and better efficiency ⋮ Functional Encryption: Origins and Recent Developments ⋮ Directly revocable key-policy attribute-based encryption with verifiable ciphertext delegation ⋮ Revocable attribute-based encryption with decryption key exposure resistance and ciphertext delegation ⋮ Simplifying Design and Analysis of Complex Predicate Encryption Schemes ⋮ Practical Ciphertext-Policy Attribute-Based Encryption: Traitor Tracing, Revocation, and Large Universe ⋮ Fuzzy matching and direct revocation: a new CP-ABE scheme from multilinear maps ⋮ SEMD: secure and efficient message dissemination with policy enforcement in VANET ⋮ Revocable hierarchical identity-based encryption with adaptive security ⋮ A Cloud-Based Access Control Scheme with User Revocation and Attribute Update ⋮ A PROOF OF SECURITY FOR A KEY-POLICY RS-ABE SCHEME ⋮ Blocked linear secret sharing scheme for scalable attribute based encryption in manageable cloud storage system
This page was built for publication: Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption