Attribute-based encryption

Results: 38



#Item
1Cryptography / Public-key cryptography / Identity-based cryptography / Attribute-based encryption / Cryptographic software / Public key infrastructure / ID-based encryption / Encryption / Key / Identity-based conditional proxy re-encryption / Deniable encryption

April 17, 2018 An Introduction to Attribute-Based Encryption Attribute Based Encryption Encryption is a method of encoding data that protects the confidentiality of its contents from unauthorized attackers. Traditionall

Add to Reading List

Source URL: www.zeutro.com

Language: English - Date: 2018-04-24 17:18:08
2

Attribute-Based Encryption for Circuits Sergey Gorbunov∗ Vinod Vaikuntanathan† Hoeteck Wee‡

Add to Reading List

Source URL: eprint.iacr.org

- Date: 2013-05-31 21:04:06
    3

    Targeted Homomorphic Attribute Based Encryption Zvika Brakerski∗ David Cash† Rotem Tsabary∗

    Add to Reading List

    Source URL: eprint.iacr.org

    - Date: 2016-07-11 11:15:24
      4

      Attribute-Based Encryption for Arithmetic Circuits Dan Boneh∗ Valeria Nikolaenko† Gil Segev‡

      Add to Reading List

      Source URL: eprint.iacr.org

      - Date: 2013-10-21 19:18:05
        5Cryptography / Public-key cryptography / Attribute-based encryption / Encryption / ID-based encryption / Personal health record / RSA / Key / Cipher / Data Encryption Standard / Cloud computing security / Identity-based conditional proxy re-encryption

        ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

        Add to Reading List

        Source URL: www.ijmetmr.com

        Language: English - Date: 2015-07-06 14:15:02
        6Cryptography / Public-key cryptography / Identity-based cryptography / Attribute-based encryption / Cloud computing security / Encryption / ID-based encryption / Cipher / Identity-based conditional proxy re-encryption / Encrypting File System

        ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

        Add to Reading List

        Source URL: www.ijmetmr.com

        Language: English - Date: 2015-06-03 03:06:48
        7Cryptography / Attribute-based encryption / Cipher / Encryption

        Attribute Based Encryption for Android Advisor(s): Christian Hanser Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

        Add to Reading List

        Source URL: www.iaik.tugraz.at

        Language: English - Date: 2015-11-30 11:00:03
        8Cloud storage / Cloud computing / Cloud infrastructure / Data security / Attribute-based encryption / Public-key cryptography / Encryption / Key management / Cloud computing security / HP Cloud

        ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

        Add to Reading List

        Source URL: www.ijmetmr.com

        Language: English - Date: 2015-06-03 07:38:35
        9Public-key cryptography / Cryptography / Encryption / Ciphertext indistinguishability / Attribute-based encryption / ID-based encryption / RSA / Cipher / Data Encryption Standard / Identity-based conditional proxy re-encryption / Semantic security

        2015 IEEE Symposium on Security and Privacy Forward Secure Asynchronous Messaging from Puncturable Encryption Matthew D. Green and Ian Miers Department of Computer Science

        Add to Reading List

        Source URL: www.ieee-security.org

        Language: English - Date: 2015-05-11 16:43:14
        10Public-key cryptography / Cryptography / Public key infrastructure / Encryption / Attribute-based encryption / PKE / Digital signature / Side-channel attack / RSA

        Hello everybody ! See you at the next conference!

        Add to Reading List

        Source URL: security-lab.jaist.ac.jp

        Language: English - Date: 2015-11-22 02:25:24
        UPDATE