Conjunctive Broadcast and Attribute-Based Encryption
From MaRDI portal
Publication:3392916
DOI10.1007/978-3-642-03298-1_16zbMath1248.94050OpenAlexW1595022482MaRDI QIDQ3392916
Nuttapong Attrapadung, Hiroshi Imai
Publication date: 18 August 2009
Published in: Pairing-Based Cryptography – Pairing 2009 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-03298-1_16
broadcast encryptionattribute-based encryptionciphertext policykey policyrevocable ABEdisjunctive multi-authority ABE
Related Items (20)
Revocable Decentralized Multi-Authority Functional Encryption ⋮ Generic constructions for fully secure revocable attribute-based encryption ⋮ Efficient revocable identity-based encryption via subset difference methods ⋮ A conditional access system with revocation for mobile pay-TV systems revisited ⋮ Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice ⋮ Attribute-based encryption schemes with constant-size ciphertexts ⋮ Generic construction of trace-and-revoke inner product functional encryption ⋮ Provably secure role-based encryption with revocation mechanism ⋮ Accountable authority key policy attribute-based encryption ⋮ (Dual) server-aided revocable attribute-based encryption with decryption key exposure resistance ⋮ An efficient and revocable storage CP-ABE scheme in the cloud computing ⋮ Server-Aided Directly Revocable Ciphertext-Policy Attribute-Based Encryption with Verifiable Delegation ⋮ Computational friendly attribute-based encryptions with short ciphertext ⋮ Revocable Identity-Based Encryption Revisited: Security Model and Construction ⋮ Directly revocable key-policy attribute-based encryption with verifiable ciphertext delegation ⋮ Practical Ciphertext-Policy Attribute-Based Encryption: Traitor Tracing, Revocation, and Large Universe ⋮ Fuzzy matching and direct revocation: a new CP-ABE scheme from multilinear maps ⋮ Match me if you can: matchmaking encryption and its applications ⋮ Attribute-based encryption with adaptive policy ⋮ Lattice-based revocable (hierarchical) IBE with decryption key exposure resistance
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Public Key Broadcast Encryption for Stateless Receivers
- Bounded Ciphertext Policy Attribute Based Encryption
- Multi-authority Attribute Based Encryption
- Generalized Identity Based and Broadcast Encryption Schemes
- Fuzzy Identity-Based Encryption
- Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys
- Graph-Decomposition-Based Frameworks for Subset-Cover Broadcast Encryption and Efficient Instantiations
- Forward-Secure and Searchable Broadcast Encryption with Short Ciphertexts and Private Keys
This page was built for publication: Conjunctive Broadcast and Attribute-Based Encryption