Attribute-based encryption

Results: 38



#Item
21RSA / Chosen-ciphertext attack / XTR / Cramer–Shoup cryptosystem / Cryptography / Public-key cryptography / Cipher

Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data Vipul Goyal∗ Omkant Pandey†

Add to Reading List

Source URL: www.caida.org

Language: English - Date: 2015-02-04 04:34:32
22Kütahya Dumlupınar University / Kütahya Province

Attribute-based Encryption for Open MHealth

Add to Reading List

Source URL: www.caida.org

Language: English - Date: 2015-02-04 04:34:32
23Espionage / Security / Cipher / RSA / ID-based encryption / Chosen-ciphertext attack / Chosen-plaintext attack / Cramer–Shoup cryptosystem / ElGamal encryption / Public-key cryptography / Cryptography / Cyberwarfare

Ciphertext-Policy Attribute-Based Encryption

Add to Reading List

Source URL: www.caida.org

Language: English - Date: 2015-05-04 18:43:48
24Lattice problem / Learning with errors / Lattice / Public-key cryptography / Cipher / Symmetric-key algorithm / Semantic security / GGH encryption scheme / Ideal lattice cryptography / Cryptography / Lattice-based cryptography / Homomorphic encryption

Attribute-Based Functional Encryption on Lattices (Extended Abstract) Xavier Boyen December 31, 2012

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-31 10:07:10
25Surface chemistry / Renewable energy commercialization / Adsorption / Dye / Titanium dioxide / Chemistry / Dye-sensitized solar cells / Ultraviolet radiation

Verifiable Attribute Based Encryption Qiang Tang and Dongyao Ji State Key Lab of Information Securrity, Graduate University of Chinese Academy of Sciences, Beijing,100049 ,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-07-10 22:02:13
26Symbol

Fully Secure Unbounded Revocable Attribute-Based Encryption in Prime Order Bilinear Groups via Subset Difference Method Pratish Datta, Ratna Dutta, and Sourav Mukhopadhyay Department of Mathematics Indian Institute of Te

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-31 05:11:23
    27Cipher / Chosen-plaintext attack / Broadcast encryption / Chosen-ciphertext attack / RSA / Cramer–Shoup cryptosystem / Paillier cryptosystem / Cryptography / Public-key cryptography / Ciphertext

    Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data Vipul Goyal∗ Omkant Pandey†

    Add to Reading List

    Source URL: research.microsoft.com

    Language: English - Date: 2012-05-29 07:38:50
    28RSA / Cipher / XTR / ID-based encryption / Cramer–Shoup cryptosystem / Cryptography / Public-key cryptography / Electronic commerce

    Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption Yannis Rouselakis1 and Brent Waters2 1 2

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2015-01-10 02:06:29
    29RSA / Cipher / Cyberwarfare / Applied mathematics / Security / Cryptography / Public-key cryptography / Electronic commerce

    Security Weaknesses of an “Anonymous Attribute Based Encryption” appeared in ASIACCS’13 Payal Chaudhari, Manik Lal Das, Anish Mathuria DA-IICT, Gandhinagar, India {payal chaudhari, maniklal das, anish mathuria}@dai

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2015-01-05 08:05:41
    30Elliptic curves / Cryptography / Group theory / Finite fields / Linear algebra / Elliptic curve cryptography / Pairing / Elliptic curve / Supersingular elliptic curve / Algebra / Abstract algebra / Mathematics

    SUBMITTED TO JOURNAL OF 1 Software implementation of an Attribute-Based Encryption scheme

    Add to Reading List

    Source URL: cacr.uwaterloo.ca

    Language: English - Date: 2014-05-30 22:32:03
    UPDATE