Decentralizing Attribute-Based Encryption
From MaRDI portal
Publication:3003403
DOI10.1007/978-3-642-20465-4_31zbMath1290.94106OpenAlexW1682451491MaRDI QIDQ3003403
Publication date: 27 May 2011
Published in: Advances in Cryptology – EUROCRYPT 2011 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-20465-4_31
Related Items (65)
A bunch of broken schemes: a simple yet powerful linear approach to analyzing security of attribute-based encryption ⋮ Fast, Compact, and Expressive Attribute-Based Encryption ⋮ An asymptotically perfect secret sharing scheme based on the Chinese Remainder Theorem ⋮ Revocable Decentralized Multi-Authority Functional Encryption ⋮ Communication Complexity of Conditional Disclosure of Secrets and Attribute-Based Encryption ⋮ Bilinear Entropy Expansion from the Decisional Linear Assumption ⋮ Cross-domain attribute-based access control encryption ⋮ Verifiable fully outsourced attribute-based signcryption system for IoT eHealth big data in cloud computing ⋮ Decentralized policy-hiding ABE with receiver privacy ⋮ A general framework for secure sharing of personal health records in cloud system ⋮ Key regeneration-free ciphertext-policy attribute-based encryption and its application ⋮ A survey of lattice based expressive attribute based encryption ⋮ Key-Policy Multi-authority Attribute-Based Encryption ⋮ Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption ⋮ Cryptanalysis of Boyen's attribute-based encryption scheme in TCC 2013 ⋮ Bounded-collusion decentralized ABE with sublinear parameters ⋮ Adaptive Security via Deletion in Attribute-Based Encryption: Solutions from Search Assumptions in Bilinear Groups ⋮ Quantum attribute-based encryption: a comprehensive study ⋮ Fully adaptive decentralized multi-authority \textsf{ABE} ⋮ Registered attribute-based encryption ⋮ Déjà Q All Over Again: Tighter and Broader Reductions of q-Type Assumptions ⋮ Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice ⋮ An Efficient and Expressive Ciphertext-Policy Attribute-Based Encryption Scheme with Partially Hidden Access Structures ⋮ A practical compiler for attribute-based encryption: new decentralized constructions and more ⋮ Multi-authority ABE for non-monotonic access structures ⋮ Decentralized multi-authority attribute-based inner-product FE: large universe and unbounded ⋮ GLUE: generalizing unbounded attribute-based encryption for flexible efficiency trade-offs ⋮ (Compact) adaptively secure FE for attribute-weighted sums from \(k\)-lin ⋮ TinyABE: unrestricted ciphertext-policy attribute-based encryption for embedded devices and low-quality networks ⋮ Multi-authority ABE from lattices without random oracles ⋮ Identity-based matchmaking encryption from standard assumptions ⋮ A survey on functional encryption ⋮ How to sample a discrete Gaussian (and more) from a random oracle ⋮ Hierarchical and non-monotonic key-policy attribute-based encryption and its application ⋮ Succinct multi-authority attribute-based access control for circuits with authenticated outsourcing ⋮ Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage ⋮ Decentralized multi-authority ABE for \(\mathsf{NC}^1\) from BDH ⋮ Multi-party functional encryption ⋮ Efficient attribute-based signature for monotone predicates ⋮ Ciphertext-policy attribute-based encryption for general circuits from bilinear maps ⋮ Hierarchical attribute based encryption with continuous leakage-resilience ⋮ Expanded Framework for Dual System Encryption and Its Application ⋮ An efficient key-policy attribute-based encryption scheme with constant ciphertext length ⋮ Fast, compact, and expressive attribute-based encryption ⋮ Cost-Effective and Scalable Data Sharing in Cloud Storage Using Hierarchical Attribute-Based Encryption with Forward Security ⋮ Self-updatable encryption: time constrained access control with hidden attributes and better efficiency ⋮ Computational friendly attribute-based encryptions with short ciphertext ⋮ Functional Encryption: Origins and Recent Developments ⋮ Decentralized Attribute-Based Signatures ⋮ Simplifying Design and Analysis of Complex Predicate Encryption Schemes ⋮ Attribute-based key-insulated signature for boolean formula ⋮ Escrow free attribute-based signature with self-revealability ⋮ An expressive and provably secure ciphertext-policy attribute-based encryption ⋮ A multi-authority approach to various predicate encryption types ⋮ Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing ⋮ Decentralized multi-authority \textbf{\textsf{ABE}} for \textbf{\textsf{DNF}}s from \textbf{\textsf{LWE}} ⋮ Efficient Ciphertext Policy Attribute-Based Encryption with Constant-Size Ciphertext and Constant Computation-Cost ⋮ Non-interactive CCA2-secure threshold cryptosystems: achieving adaptive security in the standard model without pairings ⋮ A fully distributed hierarchical attribute-based encryption scheme ⋮ Attribute-Based Encryption for Range Attributes ⋮ Efficient fully CCA-secure predicate encryptions from pair encodings ⋮ A decentralized multi-authority ciphertext-policy attribute-based encryption with mediated obfuscation ⋮ Blocked linear secret sharing scheme for scalable attribute based encryption in manageable cloud storage system ⋮ Still wrong use of pairings in cryptography ⋮ Dynamic decentralized functional encryption
This page was built for publication: Decentralizing Attribute-Based Encryption