Computational friendly attribute-based encryptions with short ciphertext
From MaRDI portal
Publication:512647
DOI10.1016/j.tcs.2016.12.030zbMath1367.94341OpenAlexW2570481456WikidataQ122415864 ScholiaQ122415864MaRDI QIDQ512647
Y. Sreenivasa Rao, Ratna Dutta
Publication date: 27 February 2017
Published in: Theoretical Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.tcs.2016.12.030
attribute-based encryption(non-)monotone access structurechosen ciphertext securitydual-policykey-policylinear secret-sharing scheme
Related Items (3)
Efficient attribute-based proxy re-encryption with constant size ciphertexts ⋮ Generic conversions from CPA to CCA without ciphertext expansion for threshold ABE with constant-size ciphertexts ⋮ A fully distributed hierarchical attribute-based encryption scheme
Cites Work
- Unnamed Item
- Unnamed Item
- Attribute-based encryption schemes with constant-size ciphertexts
- Predicate encryption supporting disjunctions, polynomial equations, and inner products
- Computationally Efficient Dual-Policy Attribute Based Encryption with Short Ciphertext
- Threshold Ciphertext Policy Attribute-Based Encryption with Constant Size Ciphertexts
- Computationally Efficient Expressive Key-Policy Attribute Based Encryption Schemes with Constant-Size Ciphertext
- Unbounded HIBE and Attribute-Based Encryption
- Decentralizing Attribute-Based Encryption
- Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts
- Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization
- Generic Constructions for Chosen-Ciphertext Secure Attribute Based Encryption
- Efficient Ciphertext Policy Attribute-Based Encryption with Constant-Size Ciphertext and Constant Computation-Cost
- Conjunctive Broadcast and Attribute-Based Encryption
- Constant Size Ciphertexts in Threshold Attribute-Based Encryption
- Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
- Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption
- Conjunctive, Subset, and Range Queries on Encrypted Data
- Multi-authority Attribute Based Encryption
- Attribute-Based Encryption with Fast Decryption
- Efficient CCA-Secure PKE from Identity-Based Techniques
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - EUROCRYPT 2004
- Efficient Identity-Based Encryption Without Random Oracles
- Fuzzy Identity-Based Encryption
- Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys
- Attribute-based key-insulated signature for boolean formula
This page was built for publication: Computational friendly attribute-based encryptions with short ciphertext