Accountable authority key policy attribute-based encryption
From MaRDI portal
Publication:439851
DOI10.1007/S11432-012-4594-7zbMath1245.68081OpenAlexW2135813225WikidataQ121267680 ScholiaQ121267680MaRDI QIDQ439851
Yong-tao Wang, Zhaohui Liu, Yu Long, Ke-Fei Chen
Publication date: 17 August 2012
Published in: Science China. Information Sciences (Search for Journal in Brave)
Full work available at URL: http://engine.scichina.com/doi/10.1007/s11432-012-4594-7
Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62)
Related Items (1)
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Identity-Based Cryptosystems and Signature Schemes
- Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization
- Conjunctive Broadcast and Attribute-Based Encryption
- Traceable and Retrievable Identity-Based Encryption
- Defending against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems
- Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
- Practical Identity-Based Encryption Without Random Oracles
- Reducing Trust in the PKG in Identity Based Cryptosystems
- Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys
- Efficient Identity-Based Encryption Without Random Oracles
- Fuzzy Identity-Based Encryption
- CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption
This page was built for publication: Accountable authority key policy attribute-based encryption