Back to Results
First PageMeta Content
RSA / Chosen-ciphertext attack / XTR / Cramer–Shoup cryptosystem / Cryptography / Public-key cryptography / Cipher


Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data Vipul Goyal∗ Omkant Pandey†
Add to Reading List

Document Date: 2015-02-04 04:34:32


Open Document

File Size: 270,96 KB

Share Result on Facebook

City

Beverly Hills / Hierarchical Identity / New York / Attributed / Policy Attribute / Haifa / Alexandria / Fuzzy Identity / /

Company

G1 / ACM Press / Google / G2 / Secure Atrribute-Based Systems / Intel / TiVo / Cisco Networks / Yahoo / /

Country

United States / North Korea / Israel / South Korea / /

Currency

pence / USD / /

/

Event

FDA Phase / /

Facility

Israel Institute of Technology / /

IndustryTerm

generation algorithm / storage server / semantic web / efficient protocols / probabilistic polynomial-time algorithm / software vulnerability exploit / software checks / decryption algorithm / web portal sites / recursive algorithm / Fine-grained access control systems / keyword-based search / Internet traffic / encrypted search / large-scale networked systems / bilinear / natural applications / search query / attractive solution / delegation tools / /

OperatingSystem

L3 / /

Organization

UCLA / National Science Foundation / American Federation of Information Processing Societies Proceedings / Department of Interior / United States Army / Department of Homeland Security / Israel Institute of Technology / Technion / /

Person

Myong H. Kang / Kent E. Seamons / Dario Catalano / Robert W. Bradshaw / Amit Sahai‡ Brent Waters / Dan Boneh / Andrea Colgrove / Gregory Neven / Atul Prakash / Hugh Harney / Brent Waters / Xavier Boyen / Marianne Winslett / Ting Yu / Joon S. Park / Patrick Drew McDaniel / William H. Winsborough / Ben Lynn / Wolfgang Nejdl / Rita Gavriloaie / Jason E. Holt / Michel Abdalla / Jiangtao Li / Ingo Wegener / Qixiang Mei / Bart Preneel / Vladimiro Sassone / Jeremy Horwitz / Ninghui Li / Craig Gentry / Judith N. Froscher / John Malone-Lee / Daniel Olmedilla / Alice Silverberg / Ty / Jonathan Katz / /

Position

editor / General / Lieutenant / author / forensic analyst / director / analyst / Private / /

Product

Franklin / L3 / /

ProgrammingLanguage

php / /

ProvinceOrState

Virginia / New York / /

PublishedMedium

Lecture Notes in Computer Science / /

Technology

randomized algorithm / php / designing efficient protocols / Ciphertext-Policy Attribute-Based Encryption / Setup algorithm / hierarchical identity-based encryption / systems Ciphertext-Policy Attribute-Based Encryption / Identity-Based Encryption / The algorithm / private key / secret key / ID-Based Encryption / recursive algorithm / Attribute-based encryption / Encryption / error-tolerant encryption / cryptography / Resistant Broadcast Encryption / key generation algorithm / Public key / Public-Key Encryption / probabilistic polynomial-time algorithm / simulation / decryption algorithm / valid random encryption / four algorithms / /

URL

http /

SocialTag