Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Conjunctive Broadcast and Attribute-Based Encryption - MaRDI portal

Conjunctive Broadcast and Attribute-Based Encryption

From MaRDI portal
Publication:3392916

DOI10.1007/978-3-642-03298-1_16zbMath1248.94050OpenAlexW1595022482MaRDI QIDQ3392916

Nuttapong Attrapadung, Hiroshi Imai

Publication date: 18 August 2009

Published in: Pairing-Based Cryptography – Pairing 2009 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-03298-1_16




Related Items (20)

Revocable Decentralized Multi-Authority Functional EncryptionGeneric constructions for fully secure revocable attribute-based encryptionEfficient revocable identity-based encryption via subset difference methodsA conditional access system with revocation for mobile pay-TV systems revisitedSystematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practiceAttribute-based encryption schemes with constant-size ciphertextsGeneric construction of trace-and-revoke inner product functional encryptionProvably secure role-based encryption with revocation mechanismAccountable authority key policy attribute-based encryption(Dual) server-aided revocable attribute-based encryption with decryption key exposure resistanceAn efficient and revocable storage CP-ABE scheme in the cloud computingServer-Aided Directly Revocable Ciphertext-Policy Attribute-Based Encryption with Verifiable DelegationComputational friendly attribute-based encryptions with short ciphertextRevocable Identity-Based Encryption Revisited: Security Model and ConstructionDirectly revocable key-policy attribute-based encryption with verifiable ciphertext delegationPractical Ciphertext-Policy Attribute-Based Encryption: Traitor Tracing, Revocation, and Large UniverseFuzzy matching and direct revocation: a new CP-ABE scheme from multilinear mapsMatch me if you can: matchmaking encryption and its applicationsAttribute-based encryption with adaptive policyLattice-based revocable (hierarchical) IBE with decryption key exposure resistance



Cites Work


This page was built for publication: Conjunctive Broadcast and Attribute-Based Encryption