Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Decentralizing Attribute-Based Encryption - MaRDI portal

Decentralizing Attribute-Based Encryption

From MaRDI portal
Publication:3003403

DOI10.1007/978-3-642-20465-4_31zbMath1290.94106OpenAlexW1682451491MaRDI QIDQ3003403

Brent Waters, Allison Lewko

Publication date: 27 May 2011

Published in: Advances in Cryptology – EUROCRYPT 2011 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-20465-4_31




Related Items (65)

A bunch of broken schemes: a simple yet powerful linear approach to analyzing security of attribute-based encryptionFast, Compact, and Expressive Attribute-Based EncryptionAn asymptotically perfect secret sharing scheme based on the Chinese Remainder TheoremRevocable Decentralized Multi-Authority Functional EncryptionCommunication Complexity of Conditional Disclosure of Secrets and Attribute-Based EncryptionBilinear Entropy Expansion from the Decisional Linear AssumptionCross-domain attribute-based access control encryptionVerifiable fully outsourced attribute-based signcryption system for IoT eHealth big data in cloud computingDecentralized policy-hiding ABE with receiver privacyA general framework for secure sharing of personal health records in cloud systemKey regeneration-free ciphertext-policy attribute-based encryption and its applicationA survey of lattice based expressive attribute based encryptionKey-Policy Multi-authority Attribute-Based EncryptionEfficient Statically-Secure Large-Universe Multi-Authority Attribute-Based EncryptionCryptanalysis of Boyen's attribute-based encryption scheme in TCC 2013Bounded-collusion decentralized ABE with sublinear parametersAdaptive Security via Deletion in Attribute-Based Encryption: Solutions from Search Assumptions in Bilinear GroupsQuantum attribute-based encryption: a comprehensive studyFully adaptive decentralized multi-authority \textsf{ABE}Registered attribute-based encryptionDéjà Q All Over Again: Tighter and Broader Reductions of q-Type AssumptionsSystematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practiceAn Efficient and Expressive Ciphertext-Policy Attribute-Based Encryption Scheme with Partially Hidden Access StructuresA practical compiler for attribute-based encryption: new decentralized constructions and moreMulti-authority ABE for non-monotonic access structuresDecentralized multi-authority attribute-based inner-product FE: large universe and unboundedGLUE: generalizing unbounded attribute-based encryption for flexible efficiency trade-offs(Compact) adaptively secure FE for attribute-weighted sums from \(k\)-linTinyABE: unrestricted ciphertext-policy attribute-based encryption for embedded devices and low-quality networksMulti-authority ABE from lattices without random oraclesIdentity-based matchmaking encryption from standard assumptionsA survey on functional encryptionHow to sample a discrete Gaussian (and more) from a random oracleHierarchical and non-monotonic key-policy attribute-based encryption and its applicationSuccinct multi-authority attribute-based access control for circuits with authenticated outsourcingMulti-authority attribute-based encryption access control scheme with policy hidden for cloud storageDecentralized multi-authority ABE for \(\mathsf{NC}^1\) from BDHMulti-party functional encryptionEfficient attribute-based signature for monotone predicatesCiphertext-policy attribute-based encryption for general circuits from bilinear mapsHierarchical attribute based encryption with continuous leakage-resilienceExpanded Framework for Dual System Encryption and Its ApplicationAn efficient key-policy attribute-based encryption scheme with constant ciphertext lengthFast, compact, and expressive attribute-based encryptionCost-Effective and Scalable Data Sharing in Cloud Storage Using Hierarchical Attribute-Based Encryption with Forward SecuritySelf-updatable encryption: time constrained access control with hidden attributes and better efficiencyComputational friendly attribute-based encryptions with short ciphertextFunctional Encryption: Origins and Recent DevelopmentsDecentralized Attribute-Based SignaturesSimplifying Design and Analysis of Complex Predicate Encryption SchemesAttribute-based key-insulated signature for boolean formulaEscrow free attribute-based signature with self-revealabilityAn expressive and provably secure ciphertext-policy attribute-based encryptionA multi-authority approach to various predicate encryption typesEnsuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computingDecentralized multi-authority \textbf{\textsf{ABE}} for \textbf{\textsf{DNF}}s from \textbf{\textsf{LWE}}Efficient Ciphertext Policy Attribute-Based Encryption with Constant-Size Ciphertext and Constant Computation-CostNon-interactive CCA2-secure threshold cryptosystems: achieving adaptive security in the standard model without pairingsA fully distributed hierarchical attribute-based encryption schemeAttribute-Based Encryption for Range AttributesEfficient fully CCA-secure predicate encryptions from pair encodingsA decentralized multi-authority ciphertext-policy attribute-based encryption with mediated obfuscationBlocked linear secret sharing scheme for scalable attribute based encryption in manageable cloud storage systemStill wrong use of pairings in cryptographyDynamic decentralized functional encryption







This page was built for publication: Decentralizing Attribute-Based Encryption