Self-updatable encryption: time constrained access control with hidden attributes and better efficiency
From MaRDI portal
Publication:511917
DOI10.1016/j.tcs.2016.12.027zbMath1367.94324OpenAlexW2568261576WikidataQ121294877 ScholiaQ121294877MaRDI QIDQ511917
Publication date: 22 February 2017
Published in: Theoretical Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.tcs.2016.12.027
attribute-based encryptioncloud storagepublic-key encryptionself-updatable encryptionrevocationkey evolving systemspredicate encryption
Related Items (1)
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Self-updatable encryption with short public parameters and its extensions
- Efficient selective identity-based encryption without random oracles
- Predicate encryption supporting disjunctions, polynomial equations, and inner products
- Inner-product encryption under standard assumptions
- Improved hidden vector encryption with short ciphertexts and tokens
- Fully secure hidden vector encryption under standard assumptions
- Attribute-Based Encryption for Circuits from Multilinear Maps
- Self-Updatable Encryption: Time Constrained Access Control with Hidden Attributes and Better Efficiency
- Tools for Simulating Features of Composite Order Bilinear Groups in the Prime Order Setting
- Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption
- Time-Specific Encryption from Forward-Secure Encryption
- Functional Encryption with Bounded Collusions via Multi-party Computation
- New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques
- Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption
- Functional Encryption: Definitions and Challenges
- Unbounded HIBE and Attribute-Based Encryption
- Decentralizing Attribute-Based Encryption
- Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization
- Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
- New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
- Delegating Capabilities in Predicate Encryption Systems
- General Certificateless Encryption and Timed-Release Encryption
- Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
- Time-Specific Encryption
- Conjunctive, Subset, and Range Queries on Encrypted Data
- Multi-authority Attribute Based Encryption
- Adaptive-ID Secure Revocable Identity-Based Encryption
- Hierarchical Predicate Encryption for Inner-Products
- Hierarchical ID-Based Cryptography
- Efficient Delegation of Key Generation and Revocation Functionalities in Identity-Based Encryption
- Revocable Identity-Based Encryption Revisited: Security Model and Construction
- Advances in Cryptology - EUROCRYPT 2004
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- Fuzzy Identity-Based Encryption
- Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products
- Reusable garbled circuits and succinct functional encryption
This page was built for publication: Self-updatable encryption: time constrained access control with hidden attributes and better efficiency