PBC Library
From MaRDI portal
Software:21808
No author found.
Related Items (31)
A Pairing-Less Identity-Based Blind Signature with Message Recovery Scheme for Cloud-Assisted Services ⋮ Public key encryption with distributed keyword search ⋮ Efficient multi-client order-revealing encryption and its applications ⋮ Public key encryption with temporary and fuzzy keyword search ⋮ ABE with improved auxiliary input for big data security ⋮ Public-key authenticated encryption with keyword search revisited: security model and constructions ⋮ Broadcast encryption based non-interactive key distribution in MANETs ⋮ Identity-Based Batch Provable Data Possession ⋮ Secure-channel free searchable encryption with multiple keywords: a generic construction, an instantiation, and its implementation ⋮ Short signatures without random oracles and the SDH assumption in bilinear groups ⋮ Provably secure certificate-based encryption with leakage resilience ⋮ Identity-Based Batch Provable Data Possession with Detailed Analyses ⋮ Public key based searchable encryption with fine-grained sender permission control ⋮ Verifiable functional encryption using Intel SGX ⋮ SecHome: A Secure Large-Scale Smart Home System Using Hierarchical Identity Based Encryption ⋮ Simplified small exponent test for batch verification ⋮ Anonymous spatial encryption under affine space delegation functionality with full security ⋮ Research on ciphertext-policy attribute-based encryption with attribute level user revocation in cloud storage ⋮ Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies ⋮ Anonymous HIBE with short ciphertexts: full security in prime order groups ⋮ PandA: Pairings and Arithmetic ⋮ Blockchain-based two-party fair contract signing scheme ⋮ Group signatures with controllable linkability for dynamic membership ⋮ Expressive attribute-based keyword search with constant-size ciphertext ⋮ Fully secure ABE with outsourced decryption against chosen ciphertext attack ⋮ Boneh-Boyen Signatures and the Strong Diffie-Hellman Problem ⋮ A fully distributed hierarchical attribute-based encryption scheme ⋮ An alternative approach to public cloud data auditing supporting data dynamics ⋮ A decentralized multi-authority ciphertext-policy attribute-based encryption with mediated obfuscation ⋮ Efficient system parameters for Identity-Based Encryption using supersingular elliptic curves ⋮ Authenticated hash tables based on cryptographic accumulators
This page was built for software: PBC Library