Attribute-based encryption

Results: 38



#Item
311  Fuzzy Authorization for Cloud Storage Shasha Zhu and Guang Gong, Fellow, IEEE Abstract By leveraging and modifying Ciphertext-Policy Attribute Based Encryption (CP-ABE) and OAuth, we propose

1 Fuzzy Authorization for Cloud Storage Shasha Zhu and Guang Gong, Fellow, IEEE Abstract By leveraging and modifying Ciphertext-Policy Attribute Based Encryption (CP-ABE) and OAuth, we propose

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2014-07-25 12:24:57
32Fully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size Ciphertexts Zhen Liu1 , Zhenfu Cao2 , and Duncan S. Wong1 1  City University of Hong Kong, Hong Kong SAR, China.

Fully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size Ciphertexts Zhen Liu1 , Zhenfu Cao2 , and Duncan S. Wong1 1 City University of Hong Kong, Hong Kong SAR, China.

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-04 23:55:25
33Remarks on the Cryptographic Primitive of Attribute-based Encryption Zhengjun Cao1 , Lihua Liu2,∗

Remarks on the Cryptographic Primitive of Attribute-based Encryption Zhengjun Cao1 , Lihua Liu2,∗

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-15 01:22:56
34Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption Allison Lewko ∗ University of Texas at Austin [removed]

Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption Allison Lewko ∗ University of Texas at Austin [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-26 23:47:37
35New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques Brent Waters † University of Texas at Austin [removed]

New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques Brent Waters † University of Texas at Austin [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-06-08 21:20:23
36Decentralizing Attribute-Based Encryption Brent Waters † University of Texas at Austin [removed]  Allison Lewko ∗

Decentralizing Attribute-Based Encryption Brent Waters † University of Texas at Austin [removed] Allison Lewko ∗

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-08-04 16:35:50
37Unbounded HIBE and Attribute-Based Encryption Brent Waters † University of Texas at Austin [removed]  Allison Lewko ∗

Unbounded HIBE and Attribute-Based Encryption Brent Waters † University of Texas at Austin [removed] Allison Lewko ∗

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-01-26 03:08:57
38Attribute-Based Encryption: Using Identity-Based Encryption for Access Control

Attribute-Based Encryption: Using Identity-Based Encryption for Access Control

Add to Reading List

Source URL: www.emc.com

Language: English