Anonymous attribute-based broadcast encryption with hidden multiple access structures
DOI10.1007/S10623-024-01373-2MaRDI QIDQ6564089
Publication date: 28 June 2024
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Stability and convergence of numerical methods for ordinary differential equations (65L20) Existence problems for PDEs: global existence, local existence, non-existence (35A01) Numerical solution of boundary value problems involving ordinary differential equations (65L10) Error bounds for numerical methods for ordinary differential equations (65L70) Finite difference and finite volume methods for ordinary differential equations (65L12) Numerical analysis (65-XX)
Cites Work
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Attribute based broadcast encryption with short ciphertext and decryption key
- Inner-product encryption under standard assumptions
- Ciphertext-Policy Attribute-Based Broadcast Encryption with Small Keys
- Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption
- New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques
- Efficient Privacy-Preserving Ciphertext-Policy Attribute Based-Encryption and Broadcast Encryption
- Fully Secure Cipertext-Policy Hiding CP-ABE
- Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization
- Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts
- Conjunctive Broadcast and Attribute-Based Encryption
- Attribute-Based Broadcast Encryption Scheme Made Efficient
- Delegating Capabilities in Predicate Encryption Systems
- Functional Encryption for Inner Product: Achieving Constant-Size Ciphertexts with Adaptive Security or Support for Negation
- Conjunctive, Subset, and Range Queries on Encrypted Data
- Advances in Cryptology – CRYPTO 2004
- Fuzzy Identity-Based Encryption
- Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size Ciphertexts or Decryption Keys
- Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys
- Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products
This page was built for publication: Anonymous attribute-based broadcast encryption with hidden multiple access structures
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6564089)