Ali, Mohammad; Mohajeri, Javad; Sadeghi, Mohammad-Reza; Liu, Ximeng A fully distributed hierarchical attribute-based encryption scheme. (English) Zbl 1436.68094 Theor. Comput. Sci. 815, 25-46 (2020). Reviewer: Ion Iancu (Craiova) MSC: 68P25 68M11 68M25 94A60 PDF BibTeX XML Cite \textit{M. Ali} et al., Theor. Comput. Sci. 815, 25--46 (2020; Zbl 1436.68094) Full Text: DOI
Zhang, Wenfang; Chen, Zhen; Liu, Xudong; Wang, Xiaomin CP-ABE scheme supporting fine-grained attribute direct revocation. (Chinese. English summary) Zbl 1449.94069 J. Softw. 30, No. 9, 2760-2771 (2019). MSC: 94A60 PDF BibTeX XML Cite \textit{W. Zhang} et al., J. Softw. 30, No. 9, 2760--2771 (2019; Zbl 1449.94069) Full Text: DOI
Han, Yiliang Attribute-based encryption with adaptive policy. (English) Zbl 1418.94049 Soft Comput. 23, No. 12, 4009-4017 (2019). MSC: 94A60 68P25 PDF BibTeX XML Cite \textit{Y. Han}, Soft Comput. 23, No. 12, 4009--4017 (2019; Zbl 1418.94049) Full Text: DOI
Ma, Chuangui; Ge, Aijun; Zhang, Jie Fully secure decentralized ciphertext-policy attribute-based encryption in standard model. (English) Zbl 07124892 Guo, Fuchun (ed.) et al., Information security and cryptology. 14th international conference, Inscrypt 2018, Fuzhou, China, December 14–17, 2018, Revised selected papers. Cham: Springer (ISBN 978-3-030-14233-9/pbk; 978-3-030-14234-6/ebook). Lecture Notes in Computer Science 11449, 427-447 (2018). MSC: 94A60 PDF BibTeX XML Cite \textit{C. Ma} et al., Lect. Notes Comput. Sci. 11449, 427--447 (2018; Zbl 07124892) Full Text: DOI
Qi, Yanjiao; Li, Yanping; Lu, Laifeng; Huang, Meijuan Attribute-based encryption scheme supporting user revocation in cloud storage. (Chinese. English summary) Zbl 1438.68050 J. Shaanxi Norm. Univ., Nat. Sci. Ed. 46, No. 5, 1-8 (2018). MSC: 68P25 68P20 PDF BibTeX XML Cite \textit{Y. Qi} et al., J. Shaanxi Norm. Univ., Nat. Sci. Ed. 46, No. 5, 1--8 (2018; Zbl 1438.68050) Full Text: DOI
Luo, Entao; Wang, Guojun; Liu, Qin; Meng, Dacheng Fine-grained secure friend discovery scheme in mobile social networks. (Chinese. English summary) Zbl 1424.68065 J. Softw. 29, No. 10, 3223-3238 (2018). MSC: 68P25 91D30 PDF BibTeX XML Cite \textit{E. Luo} et al., J. Softw. 29, No. 10, 3223--3238 (2018; Zbl 1424.68065) Full Text: DOI
Deng, Yuqiao; Tang, Chunming; Song, Ge; Wen, Yamin New cryptography primitive research: process based encryption. (Chinese. English summary) Zbl 1399.68044 J. Softw. 28, No. 10, 2722-2736 (2017). MSC: 68P25 94A60 PDF BibTeX XML Cite \textit{Y. Deng} et al., J. Softw. 28, No. 10, 2722--2736 (2017; Zbl 1399.68044) Full Text: DOI
Hu, Peng; Gao, Haiying Ciphertext-policy attribute-based encryption for general circuits from bilinear maps. (English) Zbl 1389.68022 Wuhan Univ. J. Nat. Sci. 22, No. 2, 171-177 (2017). MSC: 68P25 94A60 94A62 94C10 PDF BibTeX XML Cite \textit{P. Hu} and \textit{H. Gao}, Wuhan Univ. J. Nat. Sci. 22, No. 2, 171--177 (2017; Zbl 1389.68022) Full Text: DOI
Villanyi, Viktoria I. Simple multi-authority attribute-based encryption for short messages. (English) Zbl 1443.94082 Comput. Inform. 35, No. 1, 128-142 (2016). MSC: 94A60 PDF BibTeX XML Cite \textit{V. I. Villanyi}, Comput. Inform. 35, No. 1, 128--142 (2016; Zbl 1443.94082) Full Text: Link
Canard, Sébastien; Phan, Duong Hieu; Trinh, Viet Cuong A new technique for compacting secret key in attribute-based broadcast encryption. (English) Zbl 1398.94101 Foresti, Sara (ed.) et al., Cryptology and network security. 15th international conference, CANS 2016, Milan, Italy, November 14–16, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-48964-3/pbk; 978-3-319-48965-0/ebook). Lecture Notes in Computer Science 10052, 594-603 (2016). MSC: 94A60 PDF BibTeX XML Cite \textit{S. Canard} et al., Lect. Notes Comput. Sci. 10052, 594--603 (2016; Zbl 1398.94101) Full Text: DOI
Jiang, Yinhao; Susilo, Willy; Mu, Yi; Guo, Fuchun Ciphertext-policy attribute based encryption supporting access policy update. (English) Zbl 1381.94099 Chen, Liqun (ed.) et al., Provable security. 10th international conference, ProvSec 2016, Nanjing, China, November 10–11, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-47421-2/pbk; 978-3-319-47422-9/ebook). Lecture Notes in Computer Science 10005, 39-60 (2016). MSC: 94A62 68P25 PDF BibTeX XML Cite \textit{Y. Jiang} et al., Lect. Notes Comput. Sci. 10005, 39--60 (2016; Zbl 1381.94099) Full Text: DOI
Cui, Hui; Deng, Robert H.; Wu, Guowei; Lai, Junzuo An efficient and expressive ciphertext-policy attribute-based encryption scheme with partially hidden access structures. (English) Zbl 1381.94093 Chen, Liqun (ed.) et al., Provable security. 10th international conference, ProvSec 2016, Nanjing, China, November 10–11, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-47421-2/pbk; 978-3-319-47422-9/ebook). Lecture Notes in Computer Science 10005, 19-38 (2016). MSC: 94A62 68P25 PDF BibTeX XML Cite \textit{H. Cui} et al., Lect. Notes Comput. Sci. 10005, 19--38 (2016; Zbl 1381.94093) Full Text: DOI
Jiang, Di; Han, Yiliang; Yang, Xiaoyuan A construction of revocable attribute-based encryption from multi-linear maps. (Chinese. English summary) Zbl 1363.68075 J. Wuhan Univ., Nat. Sci. Ed. 62, No. 2, 148-154 (2016). MSC: 68P25 94A60 PDF BibTeX XML Cite \textit{D. Jiang} et al., J. Wuhan Univ., Nat. Sci. Ed. 62, No. 2, 148--154 (2016; Zbl 1363.68075) Full Text: DOI
Jiang, Yinhao; Susilo, Willy; Mu, Yi; Guo, Fuchun Ciphertext-policy attribute-based encryption with key-delegation abuse resistance. (English) Zbl 1405.94070 Liu, Joseph K. K. (ed.) et al., Information security and privacy. 21st Australasian conference, ACISP 2016, Melbourne, VIC, Australia, July 4–6, 2016. Proceedings. Part I. Cham: Springer (ISBN 978-3-319-40252-9/pbk; 978-3-319-40253-6/ebook). Lecture Notes in Computer Science 9722, 477-494 (2016). MSC: 94A60 PDF BibTeX XML Cite \textit{Y. Jiang} et al., Lect. Notes Comput. Sci. 9722, 477--494 (2016; Zbl 1405.94070) Full Text: DOI
Tao, Qi; Huang, Xiaofang Multi-authority ciphertext-policy attribute-based encryption scheme. (Chinese. English summary) Zbl 1349.68085 J. Wuhan Univ., Nat. Sci. Ed. 61, No. 6, 545-548 (2015). MSC: 68P25 94A60 94A62 PDF BibTeX XML Cite \textit{Q. Tao} and \textit{X. Huang}, J. Wuhan Univ., Nat. Sci. Ed. 61, No. 6, 545--548 (2015; Zbl 1349.68085) Full Text: DOI
Liu, Zhen; Wong, Duncan S. Practical ciphertext-policy attribute-based encryption: traitor tracing, revocation, and large universe. (English) Zbl 06553581 Malkin, Tal (ed.) et al., Applied cryptography and network security. 13th international conference, ACNS 2015, New York, NY, USA, June 2–5, 2015. Revised selected papers. Cham: Springer (ISBN 978-3-319-28165-0/pbk; 978-3-319-28166-7/ebook). Lecture Notes in Computer Science 9092, 127-146 (2015). MSC: 68P25 94A60 PDF BibTeX XML Cite \textit{Z. Liu} and \textit{D. S. Wong}, Lect. Notes Comput. Sci. 9092, 127--146 (2015; Zbl 06553581) Full Text: DOI
Wang, Changji; Xu, Xilei; Li, Yuan; Shi, Dongyuan Integrating ciphertext-policy attribute-based encryption with identity-based ring signature to enhance security and privacy in wireless body area networks. (English) Zbl 1403.94086 Lin, Dongdai (ed.) et al., Information security and cryptology. 10th international conference, Inscrypt 2014, Beijing, China, December 13–15, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-16744-2/pbk; 978-3-319-16745-9/ebook). Lecture Notes in Computer Science 8957, 424-442 (2015). MSC: 94A60 PDF BibTeX XML Cite \textit{C. Wang} et al., Lect. Notes Comput. Sci. 8957, 424--442 (2015; Zbl 1403.94086) Full Text: DOI
Deng, Hua; Wu, Qianhong; Qin, Bo; Domingo-Ferrer, Josep; Zhang, Lei; Liu, Jianwei; Shi, Wenchang Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts. (English) Zbl 1341.68043 Inf. Sci. 275, 370-384 (2014). MSC: 68P25 94A60 PDF BibTeX XML Cite \textit{H. Deng} et al., Inf. Sci. 275, 370--384 (2014; Zbl 1341.68043) Full Text: DOI
Balu, A.; Kuppusamy, K. An expressive and provably secure ciphertext-policy attribute-based encryption. (English) Zbl 1341.94015 Inf. Sci. 276, 354-362 (2014). MSC: 94A60 94A62 PDF BibTeX XML Cite \textit{A. Balu} and \textit{K. Kuppusamy}, Inf. Sci. 276, 354--362 (2014; Zbl 1341.94015) Full Text: DOI
Ning, Jianting; Cao, Zhenfu; Dong, Xiaolei; Wei, Lifei; Lin, Xiaodong Large universe ciphertext-policy attribute-based encryption with white-box traceability. (English) Zbl 1443.94076 Kutyłowski, Mirosław (ed.) et al., Computer security – ESORICS 2014. 19th European symposium on research in computer security, Wrocław, Poland, September 7–11, 2014. Proceedings, Part II. Berlin: Springer. Lect. Notes Comput. Sci. 8713, 55-72 (2014). MSC: 94A60 PDF BibTeX XML Full Text: DOI
Lai, Junzuo; Deng, Robert H.; Yang, Yanjiang; Weng, Jian Adaptable ciphertext-policy attribute-based encryption. (English) Zbl 1307.94067 Cao, Zhenfu (ed.) et al., Pairing-based cryptography – Pairing 2013. 6th international conference, Beijing, China, November 22–24, 2013. Revised selected papers. Berlin: Springer (ISBN 978-3-319-04872-7/pbk). Lecture Notes in Computer Science 8365, 199-214 (2014). MSC: 94A60 PDF BibTeX XML Cite \textit{J. Lai} et al., Lect. Notes Comput. Sci. 8365, 199--214 (2014; Zbl 1307.94067) Full Text: DOI
Pandit, Tapas; Barua, Rana Efficient fully secure attribute-based encryption schemes for general access structures. (English) Zbl 1303.94096 Takagi, Tsuyoshi (ed.) et al., Provable security. 6th international conference, ProvSec 2012, Chengdu, China, September 26–28, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-33271-5/pbk). Lecture Notes in Computer Science 7496, 193-214 (2012). MSC: 94A60 PDF BibTeX XML Cite \textit{T. Pandit} and \textit{R. Barua}, Lect. Notes Comput. Sci. 7496, 193--214 (2012; Zbl 1303.94096) Full Text: DOI
Lai, Junzuo; Deng, Robert H.; Li, Yingjiu Fully secure cipertext-policy hiding CP-ABE. (English) Zbl 1325.68082 Bao, Feng (ed.) et al., Information security practice and experience. 7th international conference, ISPEC 2011, Guangzhou, China, May 30 – June 1, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-21030-3/pbk). Lecture Notes in Computer Science 6672, 24-39 (2011). MSC: 68P25 94A60 94A62 PDF BibTeX XML Cite \textit{J. Lai} et al., Lect. Notes Comput. Sci. 6672, 24--39 (2011; Zbl 1325.68082) Full Text: DOI
Emura, Keita; Miyaji, Atsuko; Omote, Kazumasa; Nomura, Akito; Soshi, Masakazu A ciphertext-policy attribute-based encryption scheme with constant ciphertext length. (English) Zbl 1195.94054 Int. J. Appl. Cryptogr. 2, No. 1, 46-59 (2010). MSC: 94A60 PDF BibTeX XML Cite \textit{K. Emura} et al., Int. J. Appl. Cryptogr. 2, No. 1, 46--59 (2010; Zbl 1195.94054) Full Text: DOI
Attrapadung, Nuttapong; Imai, Hideki Conjunctive broadcast and attribute-based encryption. (English) Zbl 1248.94050 Shacham, Hovav (ed.) et al., Pairing-based cryptography – Pairing 2009. Third international conference Palo Alto, CA, USA, August 12–14, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-03297-4/pbk). Lecture Notes in Computer Science 5671, 248-265 (2009). MSC: 94A60 PDF BibTeX XML Cite \textit{N. Attrapadung} and \textit{H. Imai}, Lect. Notes Comput. Sci. 5671, 248--265 (2009; Zbl 1248.94050) Full Text: DOI
Nishide, Takashi; Yoneyama, Kazuki; Ohta, Kazuo Attribute-based encryption with partially hidden encryptor-specified access structures. (English) Zbl 1319.94081 Bellovin, Steven M. (ed.) et al., Applied cryptography and network security. 6th international conference, ACNS 2008, New York, NY, USA, June 3–6, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-68913-3/pbk). Lecture Notes in Computer Science 5037, 111-129 (2008). MSC: 94A60 68P25 PDF BibTeX XML Cite \textit{T. Nishide} et al., Lect. Notes Comput. Sci. 5037, 111--129 (2008; Zbl 1319.94081) Full Text: DOI