Goyal, Rishab; Koppula, Venkata; Waters, Brent Collusion resistant traitor tracing from learning with errors. (English) Zbl 07268370 SIAM J. Comput. 49, No. 5, STOC18-94-STOC18-241 (2020). MSC: 68P25 94A60 PDF BibTeX XML Cite \textit{R. Goyal} et al., SIAM J. Comput. 49, No. 5, STOC18--94-STOC18--241 (2020; Zbl 07268370) Full Text: DOI
Li, Jiguo; Hu, Shengzhou; Zhang, Yichen; Han, Jinguang A decentralized multi-authority ciphertext-policy attribute-based encryption with mediated obfuscation. (English) Zbl 1436.94079 Soft Comput. 24, No. 3, 1869-1882 (2020). MSC: 94A60 68P25 PDF BibTeX XML Cite \textit{J. Li} et al., Soft Comput. 24, No. 3, 1869--1882 (2020; Zbl 1436.94079) Full Text: DOI
Kowalczyk, Lucas; Wee, Hoeteck Compact adaptively secure ABE for \(\mathsf{NC}^1\) from \(k\)-Lin. (English) Zbl 07211770 J. Cryptology 33, No. 3, 954-1002 (2020). MSC: 94A60 94A62 PDF BibTeX XML Cite \textit{L. Kowalczyk} and \textit{H. Wee}, J. Cryptology 33, No. 3, 954--1002 (2020; Zbl 07211770) Full Text: DOI
Ali, Mohammad; Mohajeri, Javad; Sadeghi, Mohammad-Reza; Liu, Ximeng A fully distributed hierarchical attribute-based encryption scheme. (English) Zbl 1436.68094 Theor. Comput. Sci. 815, 25-46 (2020). Reviewer: Ion Iancu (Craiova) MSC: 68P25 68M11 68M25 94A60 PDF BibTeX XML Cite \textit{M. Ali} et al., Theor. Comput. Sci. 815, 25--46 (2020; Zbl 1436.68094) Full Text: DOI
Le, Minh Ha; Tran, Vinh Duc; Trinh, Van Anh; Trinh, Viet Cuong Compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption. (English) Zbl 07146705 Theor. Comput. Sci. 804, 219-235 (2020). MSC: 94A60 94A40 PDF BibTeX XML Cite \textit{M. H. Le} et al., Theor. Comput. Sci. 804, 219--235 (2020; Zbl 07146705) Full Text: DOI
Qin, Baodong; Zhao, Qinglan; Zheng, Dong; Cui, Hui (Dual) server-aided revocable attribute-based encryption with decryption key exposure resistance. (English) Zbl 1451.68094 Inf. Sci. 490, 74-92 (2019). MSC: 68P25 94A60 94A62 PDF BibTeX XML Cite \textit{B. Qin} et al., Inf. Sci. 490, 74--92 (2019; Zbl 1451.68094) Full Text: DOI
Li, Jiguo; Yu, Qihong; Zhang, Yichen Hierarchical attribute based encryption with continuous leakage-resilience. (English) Zbl 1448.68233 Inf. Sci. 484, 113-134 (2019). MSC: 68P25 94A60 PDF BibTeX XML Cite \textit{J. Li} et al., Inf. Sci. 484, 113--134 (2019; Zbl 1448.68233) Full Text: DOI
Xue, Liang; Yu, Yong; Li, Yannan; Au, Man Ho; Du, Xiaojiang; Yang, Bo Efficient attribute-based encryption with attribute revocation for assured data deletion. (English) Zbl 1443.68056 Inf. Sci. 479, 640-650 (2019). MSC: 68P25 68M11 68P20 PDF BibTeX XML Cite \textit{L. Xue} et al., Inf. Sci. 479, 640--650 (2019; Zbl 1443.68056) Full Text: DOI
Xu, Shengmin; Yang, Guomin; Mu, Yi Revocable attribute-based encryption with decryption key exposure resistance and ciphertext delegation. (English) Zbl 1443.68057 Inf. Sci. 479, 116-134 (2019). MSC: 68P25 94A60 PDF BibTeX XML Cite \textit{S. Xu} et al., Inf. Sci. 479, 116--134 (2019; Zbl 1443.68057) Full Text: DOI
Li, Jiguo; Yu, Qihong; Zhang, Yichen; Shen, Jian Key-policy attribute-based encryption against continual auxiliary input leakage. (English) Zbl 1441.68032 Inf. Sci. 470, 175-188 (2019). MSC: 68P25 94A60 PDF BibTeX XML Cite \textit{J. Li} et al., Inf. Sci. 470, 175--188 (2019; Zbl 1441.68032) Full Text: DOI
Pradhan, Ankit; Sethi, Kamalakanta; Mohapatra, Shrohan; Bera, Padmalochan Distributed multi-authority attribute-based encryption using cellular automata. (English) Zbl 1437.68054 Mu, Yi (ed.) et al., Cryptology and network security. 18th international conference, CANS 2019, Fuzhou, China, October 25–27, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11829, 434-456 (2019). MSC: 68P25 68Q80 94A60 PDF BibTeX XML Cite \textit{A. Pradhan} et al., Lect. Notes Comput. Sci. 11829, 434--456 (2019; Zbl 1437.68054) Full Text: DOI
Haböck, Ulrich; Krenn, Stephan Breaking and fixing anonymous credentials for the cloud. (English) Zbl 1437.68053 Mu, Yi (ed.) et al., Cryptology and network security. 18th international conference, CANS 2019, Fuzhou, China, October 25–27, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11829, 249-269 (2019). MSC: 68P25 68P27 94A62 PDF BibTeX XML Cite \textit{U. Haböck} and \textit{S. Krenn}, Lect. Notes Comput. Sci. 11829, 249--269 (2019; Zbl 1437.68053) Full Text: DOI
Chen, Hongjie; Liao, Yongjian Improvement of an outsourced attribute-based encryption scheme. (English) Zbl 1437.94056 Soft Comput. 23, No. 22, 11409-11417 (2019). MSC: 94A60 PDF BibTeX XML Cite \textit{H. Chen} and \textit{Y. Liao}, Soft Comput. 23, No. 22, 11409--11417 (2019; Zbl 1437.94056) Full Text: DOI
Kim, Jongkil; Susilo, Willy; Baek, Joonsang; Nepal, Surya; Liu, Dongxi Ciphertext-delegatable CP-ABE for a dynamic credential: a modular approach. (English) Zbl 1443.68053 Jang-Jaccard, Julian (ed.) et al., Information security and privacy. 24th Australasian conference, ACISP 2019, Christchurch, New Zealand, July 3–5, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11547, 3-20 (2019). MSC: 68P25 68M25 PDF BibTeX XML Cite \textit{J. Kim} et al., Lect. Notes Comput. Sci. 11547, 3--20 (2019; Zbl 1443.68053) Full Text: DOI
Ananth, Prabhanjan; Fan, Xiong; Shi, Elaine Towards attribute-based encryption for RAMs from LWE: sub-linear decryption, and more. (English) Zbl 07202409 Galbraith, Steven D. (ed.) et al., Advances in cryptology – ASIACRYPT 2019. 25th international conference on the theory and application of cryptology and information security, Kobe, Japan, December 8–12, 2019. Proceedings. Part I. Cham: Springer (ISBN 978-3-030-34577-8/pbk; 978-3-030-34578-5/ebook). Lecture Notes in Computer Science 11921, 112-141 (2019). MSC: 94A60 68P25 PDF BibTeX XML Cite \textit{P. Ananth} et al., Lect. Notes Comput. Sci. 11921, 112--141 (2019; Zbl 07202409) Full Text: DOI
Ateniese, Giuseppe; Francati, Danilo; Nuñez, David; Venturi, Daniele Match me if you can: matchmaking encryption and its applications. (English) Zbl 07178468 Boldyreva, Alexandra (ed.) et al., Advances in cryptology – CRYPTO 2019. 39th annual international cryptology conference, Santa Barbara, CA, USA, August 18–22, 2019. Proceedings. Part II. Cham: Springer (ISBN 978-3-030-26950-0/pbk; 978-3-030-26951-7/ebook). Lecture Notes in Computer Science 11693, 701-731 (2019). MSC: 94A60 PDF BibTeX XML Cite \textit{G. Ateniese} et al., Lect. Notes Comput. Sci. 11693, 701--731 (2019; Zbl 07178468) Full Text: DOI
Li, Juyan; Ma, Chunguang; Zhang, Kejia A novel lattice-based ciphertext-policy attribute-based proxy re-encryption for cloud sharing. (English) Zbl 1430.68092 Meng, Weizhi (ed.) et al., Security and privacy in social networks and big data. 5th international symposium, SocialSec 2019, Copenhagen, Denmark, July 14–17, 2019. Revised selected papers. Singapore: Springer. Commun. Comput. Inf. Sci. 1095, 32-46 (2019). MSC: 68P25 PDF BibTeX XML Cite \textit{J. Li} et al., Commun. Comput. Inf. Sci. 1095, 32--46 (2019; Zbl 1430.68092) Full Text: DOI
Liu, Jiming; Cao, Zhenfu; Dong, Xiaolei; Shen, Jiachen DMU-ABSE: dynamic multi-user attribute-based searchable encryption with file deletion and user revocation. (English) Zbl 1430.68093 Meng, Weizhi (ed.) et al., Security and privacy in social networks and big data. 5th international symposium, SocialSec 2019, Copenhagen, Denmark, July 14–17, 2019. Revised selected papers. Singapore: Springer. Commun. Comput. Inf. Sci. 1095, 17-31 (2019). MSC: 68P25 PDF BibTeX XML Cite \textit{J. Liu} et al., Commun. Comput. Inf. Sci. 1095, 17--31 (2019; Zbl 1430.68093) Full Text: DOI
Kim, Jongkil; Susilo, Willy; Guo, Fuchun; Baek, Joonsang; Li, Nan A new encoding framework for predicate encryption with non-linear structures in prime order groups. (English) Zbl 07160800 Deng, Robert H. (ed.) et al., Applied cryptography and network security. 17th international conference, ACNS 2019, Bogota, Colombia, June 5–7, 2019. Proceedings. Cham: Springer (ISBN 978-3-030-21567-5/pbk; 978-3-030-21568-2/ebook). Lecture Notes in Computer Science 11464, 406-425 (2019). MSC: 68P25 94A60 PDF BibTeX XML Cite \textit{J. Kim} et al., Lect. Notes Comput. Sci. 11464, 406--425 (2019; Zbl 07160800) Full Text: DOI
Blazy, Olivier; Germouty, Paul; Phan, Duong Hieu Downgradable identity-based encryption and applications. (English) Zbl 07158404 Matsui, Mitsuru (ed.), Topics in cryptology – CT-RSA 2019. The cryptographers’ track at the RSA conference 2019, San Francisco, CA, USA, March 4–8, 2019. Proceedings. Cham: Springer (ISBN 978-3-030-12611-7/pbk; 978-3-030-12612-4/ebook). Lecture Notes in Computer Science 11405, 44-61 (2019). MSC: 94A60 PDF BibTeX XML Cite \textit{O. Blazy} et al., Lect. Notes Comput. Sci. 11405, 44--61 (2019; Zbl 07158404) Full Text: DOI
Zhang, Wenfang; Chen, Zhen; Liu, Xudong; Wang, Xiaomin CP-ABE scheme supporting fine-grained attribute direct revocation. (Chinese. English summary) Zbl 1449.94069 J. Softw. 30, No. 9, 2760-2771 (2019). MSC: 94A60 PDF BibTeX XML Cite \textit{W. Zhang} et al., J. Softw. 30, No. 9, 2760--2771 (2019; Zbl 1449.94069) Full Text: DOI
Luo, Wangping; Feng, Chaosheng; Qin, Zhiguang; Yuan, Ding; Liao, Juanping; Liu, Xia Ciphertext sharing scheme for the public cloud. (Chinese. English summary) Zbl 1449.94072 J. Softw. 30, No. 8, 2517-2527 (2019). MSC: 94A62 68P25 PDF BibTeX XML Cite \textit{W. Luo} et al., J. Softw. 30, No. 8, 2517--2527 (2019; Zbl 1449.94072) Full Text: DOI
Hu, Yupu; Lian, Zhizhu; Chen, Jiangshan; Wang, Baocang; Zhang, Shanshan Algebraic attacks against several weak variants of GVW’13 ABE. (English) Zbl 1439.94034 Int. J. Found. Comput. Sci. 30, No. 4, 607-618 (2019). MSC: 94A60 68P25 PDF BibTeX XML Cite \textit{Y. Hu} et al., Int. J. Found. Comput. Sci. 30, No. 4, 607--618 (2019; Zbl 1439.94034) Full Text: DOI
Okamoto, Tatsuaki; Takashima, Katsuyuki Fully secure functional encryption with a large class of relations from the decisional linear assumption. (English) Zbl 1435.94138 J. Cryptology 32, No. 4, 1491-1573 (2019). MSC: 94A60 PDF BibTeX XML Cite \textit{T. Okamoto} and \textit{K. Takashima}, J. Cryptology 32, No. 4, 1491--1573 (2019; Zbl 1435.94138) Full Text: DOI
Wang, Xiuli; Jiang, Xiaozhou; Li, Yang Model for data access control and sharing based on blockchain. (Chinese. English summary) Zbl 1438.68053 J. Softw. 30, No. 6, 1661-1669 (2019). MSC: 68P25 94A62 PDF BibTeX XML Cite \textit{X. Wang} et al., J. Softw. 30, No. 6, 1661--1669 (2019; Zbl 1438.68053) Full Text: DOI
Han, Yiliang Attribute-based encryption with adaptive policy. (English) Zbl 1418.94049 Soft Comput. 23, No. 12, 4009-4017 (2019). MSC: 94A60 68P25 PDF BibTeX XML Cite \textit{Y. Han}, Soft Comput. 23, No. 12, 4009--4017 (2019; Zbl 1418.94049) Full Text: DOI
Zhu, Binrui; Sun, Jiameng; Qin, Jing; Ma, Jixin Fuzzy matching: multi-authority attribute searchable encryption without central authority. (English) Zbl 1415.68068 Soft Comput. 23, No. 2, 527-536 (2019). MSC: 68P25 68M11 PDF BibTeX XML Cite \textit{B. Zhu} et al., Soft Comput. 23, No. 2, 527--536 (2019; Zbl 1415.68068) Full Text: DOI
Rial, Alfredo A conditional access system with revocation for mobile pay-TV systems revisited. (English) Zbl 07053440 Inf. Process. Lett. 147, 6-9 (2019). MSC: 68Q PDF BibTeX XML Cite \textit{A. Rial}, Inf. Process. Lett. 147, 6--9 (2019; Zbl 07053440) Full Text: DOI
Koshiba, Takeshi; Takashima, Katsuyuki New assumptions on isogenous pairing groups with applications to attribute-based encryption. (English) Zbl 1433.68121 Lee, Kwangsu (ed.), Information security and cryptology – ICISC 2018. 21st international conference, Seoul, South Korea, November 28–30, 2018. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11396, 3-19 (2019). MSC: 68P25 94A60 PDF BibTeX XML Cite \textit{T. Koshiba} and \textit{K. Takashima}, Lect. Notes Comput. Sci. 11396, 3--19 (2019; Zbl 1433.68121) Full Text: DOI
Feng, Xinyu; Li, Cong; Li, Dan; Fang, Yuejian; Shen, Qingni Fully secure hidden ciphertext-policy attribute-based proxy re-encryption. (English) Zbl 1437.68052 Qing, Sihan (ed.) et al., Information and communications security. 19th international conference, ICICS 2017, Beijing, China, December 6–8, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10631, 192-204 (2018). MSC: 68P25 68P27 94A60 PDF BibTeX XML Cite \textit{X. Feng} et al., Lect. Notes Comput. Sci. 10631, 192--204 (2018; Zbl 1437.68052) Full Text: DOI
Susilo, Willy; Yang, Guomin; Guo, Fuchun; Huang, Qiong Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes. (English) Zbl 1436.94095 Inf. Sci. 429, 349-360 (2018). MSC: 94A60 PDF BibTeX XML Cite \textit{W. Susilo} et al., Inf. Sci. 429, 349--360 (2018; Zbl 1436.94095) Full Text: DOI
Wang, Jing; Huang, Chuanhe; Xiong, Neal N.; Wang, Jinhai Blocked linear secret sharing scheme for scalable attribute based encryption in manageable cloud storage system. (English) Zbl 1436.94107 Inf. Sci. 424, 1-26 (2018). MSC: 94A62 68P25 94A60 PDF BibTeX XML Cite \textit{J. Wang} et al., Inf. Sci. 424, 1--26 (2018; Zbl 1436.94107) Full Text: DOI
Wang, Jingwei; Yin, Xinchun; Ning, Jianting; Poh, Geong Sen Attribute-based encryption with efficient keyword search and user revocation. (English) Zbl 07124895 Guo, Fuchun (ed.) et al., Information security and cryptology. 14th international conference, Inscrypt 2018, Fuzhou, China, December 14–17, 2018, Revised selected papers. Cham: Springer (ISBN 978-3-030-14233-9/pbk; 978-3-030-14234-6/ebook). Lecture Notes in Computer Science 11449, 490-509 (2018). MSC: 94A60 PDF BibTeX XML Cite \textit{J. Wang} et al., Lect. Notes Comput. Sci. 11449, 490--509 (2018; Zbl 07124895) Full Text: DOI
Cui, Yuzhao; Huang, Qiong; Huang, Jianye; Li, Hongbo; Yang, Guomin Outsourced ciphertext-policy attribute-based encryption with equality test. (English) Zbl 07124893 Guo, Fuchun (ed.) et al., Information security and cryptology. 14th international conference, Inscrypt 2018, Fuzhou, China, December 14–17, 2018, Revised selected papers. Cham: Springer (ISBN 978-3-030-14233-9/pbk; 978-3-030-14234-6/ebook). Lecture Notes in Computer Science 11449, 448-467 (2018). MSC: 94A60 PDF BibTeX XML Cite \textit{Y. Cui} et al., Lect. Notes Comput. Sci. 11449, 448--467 (2018; Zbl 07124893) Full Text: DOI
Ma, Chuangui; Ge, Aijun; Zhang, Jie Fully secure decentralized ciphertext-policy attribute-based encryption in standard model. (English) Zbl 07124892 Guo, Fuchun (ed.) et al., Information security and cryptology. 14th international conference, Inscrypt 2018, Fuzhou, China, December 14–17, 2018, Revised selected papers. Cham: Springer (ISBN 978-3-030-14233-9/pbk; 978-3-030-14234-6/ebook). Lecture Notes in Computer Science 11449, 427-447 (2018). MSC: 94A60 PDF BibTeX XML Cite \textit{C. Ma} et al., Lect. Notes Comput. Sci. 11449, 427--447 (2018; Zbl 07124892) Full Text: DOI
Qi, Yanjiao; Li, Yanping; Lu, Laifeng; Huang, Meijuan Attribute-based encryption scheme supporting user revocation in cloud storage. (Chinese. English summary) Zbl 1438.68050 J. Shaanxi Norm. Univ., Nat. Sci. Ed. 46, No. 5, 1-8 (2018). MSC: 68P25 68P20 PDF BibTeX XML Cite \textit{Y. Qi} et al., J. Shaanxi Norm. Univ., Nat. Sci. Ed. 46, No. 5, 1--8 (2018; Zbl 1438.68050) Full Text: DOI
Giacon, Federico; Aragona, Riccardo; Sala, Massimiliano A proof of security for a key-policy RS-ABE scheme. (English) Zbl 1430.94070 JP J. Algebra Number Theory Appl. 40, No. 1, 29-90 (2018). MSC: 94A60 PDF BibTeX XML Cite \textit{F. Giacon} et al., JP J. Algebra Number Theory Appl. 40, No. 1, 29--90 (2018; Zbl 1430.94070) Full Text: DOI
Liu, Xudong; Zhang, Wenfang; Wang, Xiaomin Multi-authority attribute-based alterable threshold ring signature without central authority. (Chinese. English summary) Zbl 1424.94071 J. Softw. 29, No. 11, 3528-3543 (2018). MSC: 94A60 68P25 PDF BibTeX XML Cite \textit{X. Liu} et al., J. Softw. 29, No. 11, 3528--3543 (2018; Zbl 1424.94071) Full Text: DOI
Luo, Entao; Wang, Guojun; Liu, Qin; Meng, Dacheng Fine-grained secure friend discovery scheme in mobile social networks. (Chinese. English summary) Zbl 1424.68065 J. Softw. 29, No. 10, 3223-3238 (2018). MSC: 68P25 91D30 PDF BibTeX XML Cite \textit{E. Luo} et al., J. Softw. 29, No. 10, 3223--3238 (2018; Zbl 1424.68065) Full Text: DOI
Ma, Hua; Yan, Xuewei; Liu, Zhenhua; Dong, Enting Attribute-based encryption scheme supporting accountability and user revocation. (Chinese. English summary) Zbl 1424.68066 J. Jilin Univ., Sci. 56, No. 4, 939-944 (2018). MSC: 68P25 94A60 PDF BibTeX XML Cite \textit{H. Ma} et al., J. Jilin Univ., Sci. 56, No. 4, 939--944 (2018; Zbl 1424.68066) Full Text: DOI
Zhong, Hong; Cui, Jie; Zhu, Wenlong; Xu, Yan Efficient and verifiable multi-authority attribute based encryption scheme. (Chinese. English summary) Zbl 1424.68073 J. Softw. 29, No. 7, 2006-2017 (2018). MSC: 68P25 68M11 PDF BibTeX XML Cite \textit{H. Zhong} et al., J. Softw. 29, No. 7, 2006--2017 (2018; Zbl 1424.68073) Full Text: DOI
Xu, Shengmin; Yang, Guomin; Mu, Yi; Liu, Ximeng Efficient attribute-based encryption with blackbox traceability. (English) Zbl 1421.94079 Baek, Joonsang (ed.) et al., Provable security. 12th international conference, ProvSec 2018, Jeju, South Korea, October 25–28, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11192, 182-200 (2018). MSC: 94A60 PDF BibTeX XML Cite \textit{S. Xu} et al., Lect. Notes Comput. Sci. 11192, 182--200 (2018; Zbl 1421.94079) Full Text: DOI
Han, Jinguang; Yang, Ye; Liu, Joseph K.; Li, Jiguo; Liang, Kaitai; Shen, Jian Expressive attribute-based keyword search with constant-size ciphertext. (English) Zbl 1398.68115 Soft Comput. 22, No. 15, 5163-5177 (2018). MSC: 68P10 68P25 PDF BibTeX XML Cite \textit{J. Han} et al., Soft Comput. 22, No. 15, 5163--5177 (2018; Zbl 1398.68115) Full Text: DOI
Li, Wenmin; Wen, Qiaoyan; Li, Xuelei; He, Debiao Attribute-based fuzzy identity access control in multicloud computing environments. (English) Zbl 1398.94134 Soft Comput. 22, No. 12, 4071-4082 (2018). MSC: 94A60 94A62 68M11 94D05 PDF BibTeX XML Cite \textit{W. Li} et al., Soft Comput. 22, No. 12, 4071--4082 (2018; Zbl 1398.94134) Full Text: DOI
Ge, Chunpeng; Susilo, Willy; Fang, Liming; Wang, Jiandong; Shi, Yunqing A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system. (English) Zbl 1401.94155 Des. Codes Cryptography 86, No. 11, 2587-2603 (2018). MSC: 94A60 PDF BibTeX XML Cite \textit{C. Ge} et al., Des. Codes Cryptography 86, No. 11, 2587--2603 (2018; Zbl 1401.94155) Full Text: DOI
Chen, Jie; Gong, Junqing; Kowalczyk, Lucas; Wee, Hoeteck Unbounded ABE via bilinear entropy expansion, revisited. (English) Zbl 1423.94062 Nielsen, Jesper Buus (ed.) et al., Advances in cryptology – EUROCRYPT 2018. 37th annual international conference on the theory and applications of cryptographic techniques, Tel Aviv, Israel, April 29 – May 3, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 10820, 503-534 (2018). MSC: 94A60 PDF BibTeX XML Cite \textit{J. Chen} et al., Lect. Notes Comput. Sci. 10820, 503--534 (2018; Zbl 1423.94062) Full Text: DOI
Zhang, Jie; Chen, Jie; Gong, Junqing; Ge, Aijun; Ma, Chuangui Leakage-resilient attribute based encryption in prime-order groups via predicate encodings. (English) Zbl 1386.68056 Des. Codes Cryptography 86, No. 6, 1339-1366 (2018). MSC: 68P25 94A60 PDF BibTeX XML Cite \textit{J. Zhang} et al., Des. Codes Cryptography 86, No. 6, 1339--1366 (2018; Zbl 1386.68056) Full Text: DOI
Zhang, Mingwu ADR-lrABE: new mechanism of direct-revocable attribute-based encryption with continual-leakage tolerances. (English) Zbl 1390.68286 Fundam. Inform. 157, No. 1-2, 1-27 (2018). MSC: 68P25 94A60 PDF BibTeX XML Cite \textit{M. Zhang}, Fundam. Inform. 157, No. 1--2, 1--27 (2018; Zbl 1390.68286) Full Text: DOI
Wang, Geng; Zhang, Xiao; Li, Yanmei Constant decryption-cost non-monotonic ciphertext policy attribute-based encryption with reduced secret key size (and dynamic attributes). (English) Zbl 1426.94129 Chen, Xiaofeng (ed.) et al., Information security and cryptology. 13th international conference, Inscrypt 2017, Xi’an, China, November 3–5, 2017. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 10726, 223-241 (2018). MSC: 94A60 PDF BibTeX XML Cite \textit{G. Wang} et al., Lect. Notes Comput. Sci. 10726, 223--241 (2018; Zbl 1426.94129) Full Text: DOI
Canard, S.; Phan, Duong Hieu; Pointcheval, D.; Trinh, Viet Cuong A new technique for compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption. (English) Zbl 1390.94829 Theor. Comput. Sci. 723, 51-72 (2018). MSC: 94A60 PDF BibTeX XML Cite \textit{S. Canard} et al., Theor. Comput. Sci. 723, 51--72 (2018; Zbl 1390.94829) Full Text: DOI
Zhong, Hong; Zhu, Wenlong; Xu, Yan; Cui, Jie Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage. (English) Zbl 1381.94112 Soft Comput. 22, No. 1, 243-251 (2018). MSC: 94A62 94A60 68P25 PDF BibTeX XML Cite \textit{H. Zhong} et al., Soft Comput. 22, No. 1, 243--251 (2018; Zbl 1381.94112) Full Text: DOI
Chaudhari, Payal; Das, Manik Lal On the security of a searchable anonymous attribute based encryption. (English) Zbl 07215653 Giri, Debasis (ed.) et al., Mathematics and computing. Third international conference, ICMC 2017, Haldia, India, January 17–21, 2017. Proceedings. Singapore: Springer (ISBN 978-981-10-4641-4/pbk; 978-981-10-4642-1/ebook). Communications in Computer and Information Science 655, 16-25 (2017). MSC: 94A60 PDF BibTeX XML Cite \textit{P. Chaudhari} and \textit{M. L. Das}, Commun. Comput. Inf. Sci. 655, 16--25 (2017; Zbl 07215653) Full Text: DOI
He, Kun; Chen, Jing; Zhang, Yu; Du, Ruiying; Xiang, Yang; Hassan, Mohammad Mehedi; Alelaiwi, Abdulhameed Secure independent-update concise-expression access control for video on demand in cloud. (English) Zbl 1429.68014 Inf. Sci. 387, 75-89 (2017). MSC: 68M11 68P25 68P27 94A60 PDF BibTeX XML Cite \textit{K. He} et al., Inf. Sci. 387, 75--89 (2017; Zbl 1429.68014) Full Text: DOI
Zhang, Yinghui; Chen, Xiaofeng; Li, Jin; Wong, Duncan S.; Li, Hui; You, Ilsun Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing. (English) Zbl 1429.68068 Inf. Sci. 379, 42-61 (2017). MSC: 68P27 68M11 68P25 PDF BibTeX XML Cite \textit{Y. Zhang} et al., Inf. Sci. 379, 42--61 (2017; Zbl 1429.68068) Full Text: DOI
Hong, Hanshu; Xia, Yunhao; Sun, Zhixin Towards secure data retrieval for multi-tenant architecture using attribute-based key word search. (English) Zbl 1423.68151 Symmetry 9, No. 6, Paper No. 89, 10 p. (2017). MSC: 68P20 68P25 PDF BibTeX XML Cite \textit{H. Hong} et al., Symmetry 9, No. 6, Paper No. 89, 10 p. (2017; Zbl 1423.68151) Full Text: DOI
Clear, Michael; McGoldrick, Ciarán Attribute-based fully homomorphic encryption with a bounded number of inputs. (English) Zbl 1428.94066 Int. J. Appl. Cryptogr. 3, No. 4, 363-376 (2017). MSC: 94A60 PDF BibTeX XML Cite \textit{M. Clear} and \textit{C. McGoldrick}, Int. J. Appl. Cryptogr. 3, No. 4, 363--376 (2017; Zbl 1428.94066) Full Text: DOI
Meng, Ru; Zhou, Yanwei; Ning, Jianting; Liang, Kaitai; Han, Jinguang; Susilo, Willy An efficient key-policy attribute-based searchable encryption in prime-order groups. (English) Zbl 1439.94051 Okamoto, Tatsuaki (ed.) et al., Provable security. 11th international conference, ProvSec 2017, Xi’an, China, October 23–25, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10005, 39-56 (2017). MSC: 94A60 PDF BibTeX XML Cite \textit{R. Meng} et al., Lect. Notes Comput. Sci. 10005, 39--56 (2017; Zbl 1439.94051) Full Text: DOI
Deng, Yuqiao; Tang, Chunming; Song, Ge; Wen, Yamin New cryptography primitive research: process based encryption. (Chinese. English summary) Zbl 1399.68044 J. Softw. 28, No. 10, 2722-2736 (2017). MSC: 68P25 94A60 PDF BibTeX XML Cite \textit{Y. Deng} et al., J. Softw. 28, No. 10, 2722--2736 (2017; Zbl 1399.68044) Full Text: DOI
Wei, Jianghong; Huang, Xinyi; Liu, Wenfen; Hu, Xuexian Cost-effective and scalable data sharing in cloud storage using hierarchical attribute-based encryption with forward security. (English) Zbl 1387.68106 Int. J. Found. Comput. Sci. 28, No. 7, 843-868 (2017). MSC: 68P20 68P25 PDF BibTeX XML Cite \textit{J. Wei} et al., Int. J. Found. Comput. Sci. 28, No. 7, 843--868 (2017; Zbl 1387.68106) Full Text: DOI
Ma, Siqi; Lai, Junzuo; Deng, Robert H.; Ding, Xuhua Adaptable key-policy attribute-based encryption with time interval. (English) Zbl 1384.94083 Soft Comput. 21, No. 20, 6191-6200 (2017). MSC: 94A60 PDF BibTeX XML Cite \textit{S. Ma} et al., Soft Comput. 21, No. 20, 6191--6200 (2017; Zbl 1384.94083) Full Text: DOI
Chen, Jie; Gong, Junqing ABE with tag made easy. Concise framework and new instantiations in prime-order groups. (English) Zbl 1380.94079 Takagi, Tsuyoshi (ed.) et al., Advances in cryptology – ASIACRYPT 2017. 23rd international conference on the theory and applications of cryptology and information security, Hong Kong, China, December 3–7, 2017. Proceedings. Part II. Cham: Springer (ISBN 978-3-319-70696-2/pbk; 978-3-319-70697-9/ebook). Lecture Notes in Computer Science 10625, 35-65 (2017). MSC: 94A60 PDF BibTeX XML Cite \textit{J. Chen} and \textit{J. Gong}, Lect. Notes Comput. Sci. 10625, 35--65 (2017; Zbl 1380.94079) Full Text: DOI
Xu, Jie; Wen, Qiaoyan; Li, Wenmin; Shen, Jian; He, Debiao Succinct multi-authority attribute-based access control for circuits with authenticated outsourcing. (English) Zbl 1381.94107 Soft Comput. 21, No. 18, 5265-5279 (2017). MSC: 94A62 94A60 PDF BibTeX XML Cite \textit{J. Xu} et al., Soft Comput. 21, No. 18, 5265--5279 (2017; Zbl 1381.94107) Full Text: DOI
Sun, Jiameng; Zhu, Binrui; Qin, Jing; Hu, Jiankun; Wu, Qianhong Confidentiality-preserving publicly verifiable computation. (English) Zbl 1417.94081 Int. J. Found. Comput. Sci. 28, No. 6, 799-818 (2017). MSC: 94A60 68P25 PDF BibTeX XML Cite \textit{J. Sun} et al., Int. J. Found. Comput. Sci. 28, No. 6, 799--818 (2017; Zbl 1417.94081) Full Text: DOI
Wu, Zhijun; Niu, Fangchao; Pan, Deng; Lei, Jin Authority for SWIM based on attribute encryption. (Chinese. English summary) Zbl 1389.94098 J. Beijing Univ. Technol. 43, No. 3, 350-357 (2017). MSC: 94A60 68P25 PDF BibTeX XML Cite \textit{Z. Wu} et al., J. Beijing Univ. Technol. 43, No. 3, 350--357 (2017; Zbl 1389.94098) Full Text: DOI
Hu, Peng; Gao, Haiying Ciphertext-policy attribute-based encryption for general circuits from bilinear maps. (English) Zbl 1389.68022 Wuhan Univ. J. Nat. Sci. 22, No. 2, 171-177 (2017). MSC: 68P25 94A60 94A62 94C10 PDF BibTeX XML Cite \textit{P. Hu} and \textit{H. Gao}, Wuhan Univ. J. Nat. Sci. 22, No. 2, 171--177 (2017; Zbl 1389.68022) Full Text: DOI
Jia, Huiwen; Hu, Yupu Cryptanalysis of multilinear maps from ideal lattices: revisited. (English) Zbl 1391.94765 Des. Codes Cryptography 84, No. 3, 311-324 (2017). MSC: 94A60 11T71 PDF BibTeX XML Cite \textit{H. Jia} and \textit{Y. Hu}, Des. Codes Cryptography 84, No. 3, 311--324 (2017; Zbl 1391.94765) Full Text: DOI
Yang, Yanjiang; Liu, Joseph; Wei, Zhuo; Huang, Xinyi Towards revocable fine-grained encryption of cloud data: reducing trust upon cloud. (English) Zbl 1386.94090 Pieprzyk, Josef (ed.) et al., Information security and privacy. 22nd Australasian conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017. Proceedings. Part I. Cham: Springer (ISBN 978-3-319-60054-3/pbk; 978-3-319-60055-0/ebook). Lecture Notes in Computer Science 10342, 127-144 (2017). MSC: 94A60 94A62 PDF BibTeX XML Cite \textit{Y. Yang} et al., Lect. Notes Comput. Sci. 10342, 127--144 (2017; Zbl 1386.94090) Full Text: DOI
Cui, Hui; Deng, Robert H.; Liu, Joseph K.; Li, Yingjiu Attribute-based encryption with expressive and authorized keyword search. (English) Zbl 1386.94068 Pieprzyk, Josef (ed.) et al., Information security and privacy. 22nd Australasian conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017. Proceedings. Part I. Cham: Springer (ISBN 978-3-319-60054-3/pbk; 978-3-319-60055-0/ebook). Lecture Notes in Computer Science 10342, 106-126 (2017). MSC: 94A60 PDF BibTeX XML Cite \textit{H. Cui} et al., Lect. Notes Comput. Sci. 10342, 106--126 (2017; Zbl 1386.94068) Full Text: DOI
Takashima, Katsuyuki New proof techniques for DLIN-based adaptively secure attribute-based encryption. (English) Zbl 1386.94084 Pieprzyk, Josef (ed.) et al., Information security and privacy. 22nd Australasian conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017. Proceedings. Part I. Cham: Springer (ISBN 978-3-319-60054-3/pbk; 978-3-319-60055-0/ebook). Lecture Notes in Computer Science 10342, 85-105 (2017). MSC: 94A60 PDF BibTeX XML Cite \textit{K. Takashima}, Lect. Notes Comput. Sci. 10342, 85--105 (2017; Zbl 1386.94084) Full Text: DOI
Xiong, Hu; Wang, Qiang; Sun, Jianfei Comments on “Circuit ciphertext-policy attribute-based hybrid encryption with verifiable delegation”. (English) Zbl 1369.68201 Inf. Process. Lett. 127, 67-70 (2017). MSC: 68P25 94A60 PDF BibTeX XML Cite \textit{H. Xiong} et al., Inf. Process. Lett. 127, 67--70 (2017; Zbl 1369.68201) Full Text: DOI
Itkis, Gene; Shen, Emily; Varia, Mayank; Wilson, David; Yerukhimovich, Arkady Bounded-collusion attribute-based encryption from minimal assumptions. (English) Zbl 1400.94151 Fehr, Serge (ed.), Public-key cryptography – PKC 2017. 20th IACR international conference on practice and theory in public-key cryptography, Amsterdam, The Netherlands, March 28–31, 2017. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-54387-0/pbk; 978-3-662-54388-7/ebook). Lecture Notes in Computer Science 10175, 67-87 (2017). MSC: 94A60 PDF BibTeX XML Cite \textit{G. Itkis} et al., Lect. Notes Comput. Sci. 10175, 67--87 (2017; Zbl 1400.94151) Full Text: DOI
Attrapadung, Nuttapong Dual system framework in multilinear settings and applications to fully secure (compact) ABE for unbounded-size circuits. (English) Zbl 1400.94113 Fehr, Serge (ed.), Public-key cryptography – PKC 2017. 20th IACR international conference on practice and theory in public-key cryptography, Amsterdam, The Netherlands, March 28–31, 2017. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-54387-0/pbk; 978-3-662-54388-7/ebook). Lecture Notes in Computer Science 10175, 3-35 (2017). MSC: 94A60 PDF BibTeX XML Cite \textit{N. Attrapadung}, Lect. Notes Comput. Sci. 10175, 3--35 (2017; Zbl 1400.94113) Full Text: DOI
Wang, Minqian; Zhang, Zhenfeng Expanded framework for dual system encryption and its application. (English) Zbl 1381.94090 Hong, Seokhie (ed.) et al., Information security and cryptology – ICISC 2016. 19th international conference, Seoul, South Korea, November 30 – December 2, 2016. Revised selected papers. Cham: Springer (ISBN 978-3-319-53176-2/pbk; 978-3-319-53177-9/ebook). Lecture Notes in Computer Science 10157, 145-160 (2017). MSC: 94A60 68P25 PDF BibTeX XML Cite \textit{M. Wang} and \textit{Z. Zhang}, Lect. Notes Comput. Sci. 10157, 145--160 (2017; Zbl 1381.94090) Full Text: DOI
Rao, Y. Sreenivasa; Dutta, Ratna Computational friendly attribute-based encryptions with short ciphertext. (English) Zbl 1367.94341 Theor. Comput. Sci. 668, 1-26 (2017). MSC: 94A60 94A62 PDF BibTeX XML Cite \textit{Y. S. Rao} and \textit{R. Dutta}, Theor. Comput. Sci. 668, 1--26 (2017; Zbl 1367.94341) Full Text: DOI
Lee, Kwangsu; Choi, Seung Geol; Lee, Dong Hoon; Park, Jong Hwan; Yung, Moti Self-updatable encryption: time constrained access control with hidden attributes and better efficiency. (English) Zbl 1367.94324 Theor. Comput. Sci. 667, 51-92 (2017). MSC: 94A60 PDF BibTeX XML Cite \textit{K. Lee} et al., Theor. Comput. Sci. 667, 51--92 (2017; Zbl 1367.94324) Full Text: DOI
Villanyi, Viktoria I. Simple multi-authority attribute-based encryption for short messages. (English) Zbl 1443.94082 Comput. Inform. 35, No. 1, 128-142 (2016). MSC: 94A60 PDF BibTeX XML Cite \textit{V. I. Villanyi}, Comput. Inform. 35, No. 1, 128--142 (2016; Zbl 1443.94082) Full Text: Link
Canard, Sébastien; Phan, Duong Hieu; Trinh, Viet Cuong A new technique for compacting secret key in attribute-based broadcast encryption. (English) Zbl 1398.94101 Foresti, Sara (ed.) et al., Cryptology and network security. 15th international conference, CANS 2016, Milan, Italy, November 14–16, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-48964-3/pbk; 978-3-319-48965-0/ebook). Lecture Notes in Computer Science 10052, 594-603 (2016). MSC: 94A60 PDF BibTeX XML Cite \textit{S. Canard} et al., Lect. Notes Comput. Sci. 10052, 594--603 (2016; Zbl 1398.94101) Full Text: DOI
Hu, Peng; Gao, Haiying Key-policy attribute-based encryption scheme for general circuits. (Chinese. English summary) Zbl 1363.94063 J. Softw. 27, No. 6, 1498-1510 (2016). MSC: 94A60 PDF BibTeX XML Cite \textit{P. Hu} and \textit{H. Gao}, J. Softw. 27, No. 6, 1498--1510 (2016; Zbl 1363.94063) Full Text: DOI
Tian, Yangguang; Yang, Guomin; Mu, Yi; Liang, Kaitai; Yu, Yong One-round attribute-based key exchange in the multi-party setting. (English) Zbl 1381.94104 Chen, Liqun (ed.) et al., Provable security. 10th international conference, ProvSec 2016, Nanjing, China, November 10–11, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-47421-2/pbk; 978-3-319-47422-9/ebook). Lecture Notes in Computer Science 10005, 227-243 (2016). MSC: 94A62 68P25 PDF BibTeX XML Cite \textit{Y. Tian} et al., Lect. Notes Comput. Sci. 10005, 227--243 (2016; Zbl 1381.94104) Full Text: DOI
Jiang, Yinhao; Susilo, Willy; Mu, Yi; Guo, Fuchun Ciphertext-policy attribute based encryption supporting access policy update. (English) Zbl 1381.94099 Chen, Liqun (ed.) et al., Provable security. 10th international conference, ProvSec 2016, Nanjing, China, November 10–11, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-47421-2/pbk; 978-3-319-47422-9/ebook). Lecture Notes in Computer Science 10005, 39-60 (2016). MSC: 94A62 68P25 PDF BibTeX XML Cite \textit{Y. Jiang} et al., Lect. Notes Comput. Sci. 10005, 39--60 (2016; Zbl 1381.94099) Full Text: DOI
Cui, Hui; Deng, Robert H.; Wu, Guowei; Lai, Junzuo An efficient and expressive ciphertext-policy attribute-based encryption scheme with partially hidden access structures. (English) Zbl 1381.94093 Chen, Liqun (ed.) et al., Provable security. 10th international conference, ProvSec 2016, Nanjing, China, November 10–11, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-47421-2/pbk; 978-3-319-47422-9/ebook). Lecture Notes in Computer Science 10005, 19-38 (2016). MSC: 94A62 68P25 PDF BibTeX XML Cite \textit{H. Cui} et al., Lect. Notes Comput. Sci. 10005, 19--38 (2016; Zbl 1381.94093) Full Text: DOI
Yu, Gang; Cao, Zhenfu; Zeng, Guang; Han, Wenbao Accountable ciphertext-policy attribute-based encryption scheme supporting public verifiability and nonrepudiation. (English) Zbl 1381.94109 Chen, Liqun (ed.) et al., Provable security. 10th international conference, ProvSec 2016, Nanjing, China, November 10–11, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-47421-2/pbk; 978-3-319-47422-9/ebook). Lecture Notes in Computer Science 10005, 3-18 (2016). MSC: 94A62 PDF BibTeX XML Cite \textit{G. Yu} et al., Lect. Notes Comput. Sci. 10005, 3--18 (2016; Zbl 1381.94109) Full Text: DOI
Attrapadung, Nuttapong Dual system encryption framework in prime-order groups via computational pair encodings. (English) Zbl 1416.94039 Cheon, Jung Hee (ed.) et al., Advances in cryptology – ASIACRYPT 2016. 22nd international conference on the theory and application of cryptology and information security, Hanoi, Vietnam, December 4-8, 2016. Proceedings. Part II. Berlin: Springer. Lect. Notes Comput. Sci. 10032, 591-623 (2016). MSC: 94A60 PDF BibTeX XML Cite \textit{N. Attrapadung}, Lect. Notes Comput. Sci. 10032, 591--623 (2016; Zbl 1416.94039) Full Text: DOI
Apon, Daniel; Fan, Xiong; Liu, Feng-Hao Deniable attribute based encryption for branching programs from LWE. (English) Zbl 1400.94111 Hirt, Martin (ed.) et al., Theory of cryptography. 14th international conference, TCC 2016-B, Beijing, China, October 31 – November 3, 2016, Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-53643-8/pbk; 978-3-662-53644-5/ebook). Lecture Notes in Computer Science 9986, 299-329 (2016). MSC: 94A60 PDF BibTeX XML Cite \textit{D. Apon} et al., Lect. Notes Comput. Sci. 9986, 299--329 (2016; Zbl 1400.94111) Full Text: DOI
Brakerski, Zvika; Vaikuntanathan, Vinod Circuit-ABE from LWE: unbounded attributes and semi-adaptive security. (English) Zbl 1400.94127 Robshaw, Matthew (ed.) et al., Advances in cryptology – CRYPTO 2016. 36th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2016. Proceedings. Part III. Berlin: Springer (ISBN 978-3-662-53014-6/pbk; 978-3-662-53015-3/ebook). Lecture Notes in Computer Science 9816, 363-384 (2016). MSC: 94A60 PDF BibTeX XML Cite \textit{Z. Brakerski} and \textit{V. Vaikuntanathan}, Lect. Notes Comput. Sci. 9816, 363--384 (2016; Zbl 1400.94127) Full Text: DOI
Jiang, Di; Han, Yiliang; Yang, Xiaoyuan A construction of revocable attribute-based encryption from multi-linear maps. (Chinese. English summary) Zbl 1363.68075 J. Wuhan Univ., Nat. Sci. Ed. 62, No. 2, 148-154 (2016). MSC: 68P25 94A60 PDF BibTeX XML Cite \textit{D. Jiang} et al., J. Wuhan Univ., Nat. Sci. Ed. 62, No. 2, 148--154 (2016; Zbl 1363.68075) Full Text: DOI
Attrapadung, Nuttapong; Hanaoka, Goichiro; Matsumoto, Tsutomu; Teruya, Tadanori; Yamada, Shota Attribute based encryption with direct efficiency tradeoff. (English) Zbl 1348.94032 Manulis, Mark (ed.) et al., Applied cryptography and network security. 14th international conference, ACNS 2016, Guildford, UK, June 19–22, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-39554-8/pbk; 978-3-319-39555-5/ebook). Lecture Notes in Computer Science 9696, 249-266 (2016). MSC: 94A60 PDF BibTeX XML Cite \textit{N. Attrapadung} et al., Lect. Notes Comput. Sci. 9696, 249--266 (2016; Zbl 1348.94032) Full Text: DOI
Rial, Alfredo Blind attribute-based encryption and oblivious transfer with fine-grained access control. (English) Zbl 1405.94085 Des. Codes Cryptography 81, No. 2, 179-223 (2016). MSC: 94A60 68P25 PDF BibTeX XML Cite \textit{A. Rial}, Des. Codes Cryptography 81, No. 2, 179--223 (2016; Zbl 1405.94085) Full Text: DOI
Zhang, Peng; Chen, Zehong; Liang, Kaitai; Wang, Shulan; Wang, Ting A cloud-based access control scheme with user revocation and attribute update. (English) Zbl 1405.94095 Liu, Joseph K. K. (ed.) et al., Information security and privacy. 21st Australasian conference, ACISP 2016, Melbourne, VIC, Australia, July 4–6, 2016. Proceedings. Part I. Cham: Springer (ISBN 978-3-319-40252-9/pbk; 978-3-319-40253-6/ebook). Lecture Notes in Computer Science 9722, 525-540 (2016). MSC: 94A60 68M11 PDF BibTeX XML Cite \textit{P. Zhang} et al., Lect. Notes Comput. Sci. 9722, 525--540 (2016; Zbl 1405.94095) Full Text: DOI
Zhang, Yinghui; Li, Jin; Zheng, Dong; Chen, Xiaofeng; Li, Hui Accountable large-universe attribute-based encryption supporting any monotone access structures. (English) Zbl 1405.94096 Liu, Joseph K. K. (ed.) et al., Information security and privacy. 21st Australasian conference, ACISP 2016, Melbourne, VIC, Australia, July 4–6, 2016. Proceedings. Part I. Cham: Springer (ISBN 978-3-319-40252-9/pbk; 978-3-319-40253-6/ebook). Lecture Notes in Computer Science 9722, 509-524 (2016). MSC: 94A60 68P25 PDF BibTeX XML Cite \textit{Y. Zhang} et al., Lect. Notes Comput. Sci. 9722, 509--524 (2016; Zbl 1405.94096) Full Text: DOI
Zuo, Cong; Shao, Jun; Wei, Guiyi; Xie, Mande; Ji, Min Chosen ciphertext secure attribute-based encryption with outsourced decryption. (English) Zbl 1405.94097 Liu, Joseph K. K. (ed.) et al., Information security and privacy. 21st Australasian conference, ACISP 2016, Melbourne, VIC, Australia, July 4–6, 2016. Proceedings. Part I. Cham: Springer (ISBN 978-3-319-40252-9/pbk; 978-3-319-40253-6/ebook). Lecture Notes in Computer Science 9722, 495-508 (2016). MSC: 94A60 PDF BibTeX XML Cite \textit{C. Zuo} et al., Lect. Notes Comput. Sci. 9722, 495--508 (2016; Zbl 1405.94097) Full Text: DOI
Jiang, Yinhao; Susilo, Willy; Mu, Yi; Guo, Fuchun Ciphertext-policy attribute-based encryption with key-delegation abuse resistance. (English) Zbl 1405.94070 Liu, Joseph K. K. (ed.) et al., Information security and privacy. 21st Australasian conference, ACISP 2016, Melbourne, VIC, Australia, July 4–6, 2016. Proceedings. Part I. Cham: Springer (ISBN 978-3-319-40252-9/pbk; 978-3-319-40253-6/ebook). Lecture Notes in Computer Science 9722, 477-494 (2016). MSC: 94A60 PDF BibTeX XML Cite \textit{Y. Jiang} et al., Lect. Notes Comput. Sci. 9722, 477--494 (2016; Zbl 1405.94070) Full Text: DOI
Datta, Pratish; Dutta, Ratna; Mukhopadhyay, Sourav Adaptively secure unrestricted attribute-based encryption with subset difference revocation in bilinear groups of prime order. (English) Zbl 1404.94061 Pointcheval, David (ed.) et al., Progress in cryptology – AFRICACRYPT 2016. 8th international conference on cryptology in Africa, Fes, Morocco, April 13–15, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-31516-4/pbk; 978-3-319-31517-1/ebook). Lecture Notes in Computer Science 9646, 325-345 (2016). MSC: 94A60 PDF BibTeX XML Cite \textit{P. Datta} et al., Lect. Notes Comput. Sci. 9646, 325--345 (2016; Zbl 1404.94061) Full Text: DOI
Wesolowski, Benjamin; Junod, Pascal Ciphertext-policy attribute-based broadcast encryption with small keys. (English) Zbl 1384.94108 Kwon, Soonhak (ed.) et al., Information security and cryptology – ICISC 2015. 18th international conference, Seoul, South Korea, November 25–27, 2015. Revised selected papers. Cham: Springer (ISBN 978-3-319-30839-5/pbk; 978-3-319-30840-1/ebook). Lecture Notes in Computer Science 9558, 53-68 (2016). MSC: 94A60 PDF BibTeX XML Cite \textit{B. Wesolowski} and \textit{P. Junod}, Lect. Notes Comput. Sci. 9558, 53--68 (2016; Zbl 1384.94108) Full Text: DOI
Drăgan, Constantin Cătălin; Ţiplea, Ferucio Laurenţiu Key-policy attribute-based encryption for general Boolean circuits from secret sharing and multi-linear maps. (English) Zbl 1336.94093 Pasalic, Enes (ed.) et al., Cryptography and information security in the Balkans. Second international conference, BalkanCryptSec 2015, Koper, Slovenia, September 3–4, 2015. Revised selected papers. Cham: Springer (ISBN 978-3-319-29171-0/pbk; 978-3-319-29172-7/ebook). Lecture Notes in Computer Science 9540, 112-133 (2016). MSC: 94C05 94A60 PDF BibTeX XML Cite \textit{C. C. Drăgan} and \textit{F. L. Ţiplea}, Lect. Notes Comput. Sci. 9540, 112--133 (2016; Zbl 1336.94093) Full Text: DOI
Agrawal, Shashank; Chase, Melissa A study of pair encodings: predicate encryption in prime order groups. (English) Zbl 1377.94025 Kushilevitz, Eyal (ed.) et al., Theory of cryptography. 13th international conference, TCC 2016-A, Tel Aviv, Israel, January 10–13, 2016. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-49098-3/pbk; 978-3-662-49099-0/ebook). Lecture Notes in Computer Science 9563, 259-288 (2016). MSC: 94A60 PDF BibTeX XML Cite \textit{S. Agrawal} and \textit{M. Chase}, Lect. Notes Comput. Sci. 9563, 259--288 (2016; Zbl 1377.94025) Full Text: DOI
Alderman, James; Janson, Christian; Cid, Carlos; Crampton, Jason Hybrid publicly verifiable computation. (English) Zbl 1334.68055 Sako, Kazue (ed.), Topics in cryptology – CT-RSA 2016. The cryptographers’ track at the RSA conference 2016, San Francisco, CA, USA, February 29 – March 4, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-29484-1/pbk; 978-3-319-29485-8/ebook). Lecture Notes in Computer Science 9610, 147-163 (2016). MSC: 68P25 PDF BibTeX XML Cite \textit{J. Alderman} et al., Lect. Notes Comput. Sci. 9610, 147--163 (2016; Zbl 1334.68055) Full Text: DOI
Herranz, Javier Attribute-based versions of Schnorr and ElGamal. (English) Zbl 1342.94071 Appl. Algebra Eng. Commun. Comput. 27, No. 1, 17-57 (2016). MSC: 94A60 94A62 68P25 PDF BibTeX XML Cite \textit{J. Herranz}, Appl. Algebra Eng. Commun. Comput. 27, No. 1, 17--57 (2016; Zbl 1342.94071) Full Text: DOI
Datta, Pratish; Dutta, Ratna; Mukhopadhyay, Sourav Fully secure online/offline predicate and attribute-based encryption. (English) Zbl 1403.68057 Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 331-345 (2015). MSC: 68P25 94A60 PDF BibTeX XML Cite \textit{P. Datta} et al., Lect. Notes Comput. Sci. 9065, 331--345 (2015; Zbl 1403.68057) Full Text: DOI
Gorbunov, Sergey; Vaikuntanathan, Vinod; Wee, Hoeteck Attribute-based encryption for circuits. (English) Zbl 1426.68082 J. ACM 62, No. 6, Paper No. 45, 33 p. (2015). MSC: 68P25 68Q15 94A60 PDF BibTeX XML Cite \textit{S. Gorbunov} et al., J. ACM 62, No. 6, Paper No. 45, 33 p. (2015; Zbl 1426.68082) Full Text: DOI