Li, Hanjun; Lin, Huijia; Luo, Ji ABE for circuits with constant-size secret keys and adaptive security. (English) Zbl 1519.94157 Kiltz, Eike (ed.) et al., Theory of cryptography. 20th international conference, TCC 2022, Chicago, IL, USA, November 7–10, 2022. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13747, 680-710 (2023). MSC: 94A60 PDFBibTeX XMLCite \textit{H. Li} et al., Lect. Notes Comput. Sci. 13747, 680--710 (2023; Zbl 1519.94157) Full Text: DOI
Delerablée, Cécile; Gouriou, Lénaïck; Pointcheval, David Key-policy ABE with switchable attributes. (English) Zbl 1518.94054 Galdi, Clemente (ed.) et al., Security and cryptography for networks. 13th International conference, SCN 2022, Amalfi (SA), Italy, September 12–14, 2022. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13409, 147-171 (2022). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{C. Delerablée} et al., Lect. Notes Comput. Sci. 13409, 147--171 (2022; Zbl 1518.94054) Full Text: DOI
Karale, Ankita; Poulkov, Vladimir; Lazarova, Milena Attribute-based encryption. (English) Zbl 1504.94156 Bin Ahmad, Khairol Amali (ed.) et al., Functional encryption. Cham: Springer. EAI/Springer Innov. Commun. Comput., 225-242 (2021). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Karale} et al., in: Functional encryption. Cham: Springer. 225--242 (2021; Zbl 1504.94156) Full Text: DOI
Luo, Fucai; Al-Kuwari, Saif; Wang, Fuqun; Chen, Kefei Attribute-based proxy re-encryption from standard lattices. (English) Zbl 1497.68161 Theor. Comput. Sci. 865, 52-62 (2021). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{F. Luo} et al., Theor. Comput. Sci. 865, 52--62 (2021; Zbl 1497.68161) Full Text: DOI
Paul, Arinjita; Selvi, S. Sharmila Deva; Rangan, C. Pandu Efficient attribute-based proxy re-encryption with constant size ciphertexts. (English) Zbl 1492.94157 Bhargavan, Karthikeyan (ed.) et al., Progress in cryptology – INDOCRYPT 2020. 21st international conference on cryptology in India, Bangalore, India, December 13–16, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12578, 644-665 (2020). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Paul} et al., Lect. Notes Comput. Sci. 12578, 644--665 (2020; Zbl 1492.94157) Full Text: DOI
Li, Jiguo; Yu, Qihong; Zhang, Yichen; Shen, Jian Key-policy attribute-based encryption against continual auxiliary input leakage. (English) Zbl 1441.68032 Inf. Sci. 470, 175-188 (2019). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{J. Li} et al., Inf. Sci. 470, 175--188 (2019; Zbl 1441.68032) Full Text: DOI
Han, Yiliang Attribute-based encryption with adaptive policy. (English) Zbl 1418.94049 Soft Comput. 23, No. 12, 4009-4017 (2019). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{Y. Han}, Soft Comput. 23, No. 12, 4009--4017 (2019; Zbl 1418.94049) Full Text: DOI
Giacon, Federico; Aragona, Riccardo; Sala, Massimiliano A proof of security for a key-policy RS-ABE scheme. (English) Zbl 1430.94070 JP J. Algebra Number Theory Appl. 40, No. 1, 29-90 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{F. Giacon} et al., JP J. Algebra Number Theory Appl. 40, No. 1, 29--90 (2018; Zbl 1430.94070) Full Text: DOI arXiv
Ge, Chunpeng; Susilo, Willy; Fang, Liming; Wang, Jiandong; Shi, Yunqing A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system. (English) Zbl 1401.94155 Des. Codes Cryptography 86, No. 11, 2587-2603 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{C. Ge} et al., Des. Codes Cryptography 86, No. 11, 2587--2603 (2018; Zbl 1401.94155) Full Text: DOI
Meng, Ru; Zhou, Yanwei; Ning, Jianting; Liang, Kaitai; Han, Jinguang; Susilo, Willy An efficient key-policy attribute-based searchable encryption in prime-order groups. (English) Zbl 1439.94051 Okamoto, Tatsuaki (ed.) et al., Provable security. 11th international conference, ProvSec 2017, Xi’an, China, October 23–25, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10005, 39-56 (2017). MSC: 94A60 PDFBibTeX XMLCite \textit{R. Meng} et al., Lect. Notes Comput. Sci. 10005, 39--56 (2017; Zbl 1439.94051) Full Text: DOI
Deng, Yuqiao; Tang, Chunming; Song, Ge; Wen, Yamin New cryptography primitive research: process based encryption. (Chinese. English summary) Zbl 1399.68044 J. Softw. 28, No. 10, 2722-2736 (2017). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{Y. Deng} et al., J. Softw. 28, No. 10, 2722--2736 (2017; Zbl 1399.68044) Full Text: DOI
Ma, Siqi; Lai, Junzuo; Deng, Robert H.; Ding, Xuhua Adaptable key-policy attribute-based encryption with time interval. (English) Zbl 1384.94083 Soft Comput. 21, No. 20, 6191-6200 (2017). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Ma} et al., Soft Comput. 21, No. 20, 6191--6200 (2017; Zbl 1384.94083) Full Text: DOI Link
Rao, Y. Sreenivasa; Dutta, Ratna Computational friendly attribute-based encryptions with short ciphertext. (English) Zbl 1367.94341 Theor. Comput. Sci. 668, 1-26 (2017). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{Y. S. Rao} and \textit{R. Dutta}, Theor. Comput. Sci. 668, 1--26 (2017; Zbl 1367.94341) Full Text: DOI
Rao, Y. Sreenivasa; Dutta, Ratna Bandwidth-efficient attribute-based key-insulated signatures with message recovery. (English) Zbl 1428.94110 Inf. Sci. 369, 648-673 (2016). MSC: 94A62 PDFBibTeX XMLCite \textit{Y. S. Rao} and \textit{R. Dutta}, Inf. Sci. 369, 648--673 (2016; Zbl 1428.94110) Full Text: DOI
Villanyi, Viktoria I. Simple multi-authority attribute-based encryption for short messages. (English) Zbl 1443.94082 Comput. Inform. 35, No. 1, 128-142 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{V. I. Villanyi}, Comput. Inform. 35, No. 1, 128--142 (2016; Zbl 1443.94082) Full Text: Link
Brakerski, Zvika; Vaikuntanathan, Vinod Circuit-ABE from LWE: unbounded attributes and semi-adaptive security. (English) Zbl 1400.94127 Robshaw, Matthew (ed.) et al., Advances in cryptology – CRYPTO 2016. 36th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2016. Proceedings. Part III. Berlin: Springer (ISBN 978-3-662-53014-6/pbk; 978-3-662-53015-3/ebook). Lecture Notes in Computer Science 9816, 363-384 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{Z. Brakerski} and \textit{V. Vaikuntanathan}, Lect. Notes Comput. Sci. 9816, 363--384 (2016; Zbl 1400.94127) Full Text: DOI Link
Liu, Zhen; Cao, Zhenfu; Wong, Duncan S. Fully collusion-resistant traceable key-policy attribute-based encryption with sub-linear size ciphertexts. (English) Zbl 1403.94070 Lin, Dongdai (ed.) et al., Information security and cryptology. 10th international conference, Inscrypt 2014, Beijing, China, December 13–15, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-16744-2/pbk; 978-3-319-16745-9/ebook). Lecture Notes in Computer Science 8957, 403-423 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{Z. Liu} et al., Lect. Notes Comput. Sci. 8957, 403--423 (2015; Zbl 1403.94070) Full Text: DOI
Alderman, James; Janson, Christian; Cid, Carlos; Crampton, Jason Revocation in publicly verifiable outsourced computation. (English) Zbl 1400.94110 Lin, Dongdai (ed.) et al., Information security and cryptology. 10th international conference, Inscrypt 2014, Beijing, China, December 13–15, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-16744-2/pbk; 978-3-319-16745-9/ebook). Lecture Notes in Computer Science 8957, 51-71 (2015). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{J. Alderman} et al., Lect. Notes Comput. Sci. 8957, 51--71 (2015; Zbl 1400.94110) Full Text: DOI
Rao, Y. Sreenivasa; Dutta, Ratna Computationally efficient expressive key-policy attribute based encryption schemes with constant-size ciphertext. (English) Zbl 1346.94122 Qing, Sihan (ed.) et al., Information and communications security. 15th international conference, ICICS 2013, Beijing, China, November 20–22, 2013. Proceedings. Berlin: Springer (ISBN 978-3-319-02725-8/pbk). Lecture Notes in Computer Science 8233, 346-362 (2013). MSC: 94A60 PDFBibTeX XMLCite \textit{Y. S. Rao} and \textit{R. Dutta}, Lect. Notes Comput. Sci. 8233, 346--362 (2013; Zbl 1346.94122) Full Text: DOI
Rao, Y. Sreenivasa; Dutta, Ratna Computationally efficient dual-policy attribute based encryption with short ciphertext. (English) Zbl 1318.94075 Susilo, Willy (ed.) et al., Provable security. 7th international conference, ProvSec 2013, Melaka, Malaysia, October 23–25, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-41226-4/pbk). Lecture Notes in Computer Science 8209, 288-308 (2013). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{Y. S. Rao} and \textit{R. Dutta}, Lect. Notes Comput. Sci. 8209, 288--308 (2013; Zbl 1318.94075) Full Text: DOI
Pandit, Tapas; Barua, Rana Efficient fully secure attribute-based encryption schemes for general access structures. (English) Zbl 1303.94096 Takagi, Tsuyoshi (ed.) et al., Provable security. 6th international conference, ProvSec 2012, Chengdu, China, September 26–28, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-33271-5/pbk). Lecture Notes in Computer Science 7496, 193-214 (2012). MSC: 94A60 PDFBibTeX XMLCite \textit{T. Pandit} and \textit{R. Barua}, Lect. Notes Comput. Sci. 7496, 193--214 (2012; Zbl 1303.94096) Full Text: DOI
Wang, Yongtao; Chen, Kefei; Long, Yu; Liu, Zhaohui Accountable authority key policy attribute-based encryption. (English) Zbl 1245.68081 Sci. China, Inf. Sci. 55, No. 7, 1631-1638 (2012). MSC: 68P25 94A62 PDFBibTeX XMLCite \textit{Y. Wang} et al., Sci. China, Inf. Sci. 55, No. 7, 1631--1638 (2012; Zbl 1245.68081) Full Text: DOI Link
Attrapadung, Nuttapong; Imai, Hideki Conjunctive broadcast and attribute-based encryption. (English) Zbl 1248.94050 Shacham, Hovav (ed.) et al., Pairing-based cryptography – Pairing 2009. Third international conference Palo Alto, CA, USA, August 12–14, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-03297-4/pbk). Lecture Notes in Computer Science 5671, 248-265 (2009). MSC: 94A60 PDFBibTeX XMLCite \textit{N. Attrapadung} and \textit{H. Imai}, Lect. Notes Comput. Sci. 5671, 248--265 (2009; Zbl 1248.94050) Full Text: DOI