Sciweavers

36 search results - page 4 / 8
» Decentralizing Attribute-Based Encryption
Sort
View
ISCI
2010
105views more  ISCI 2010»
13 years 3 months ago
Secure threshold multi authority attribute based encryption without a central authority
Huang Lin, Zhenfu Cao, Xiaohui Liang, Jun Shao
JISE
2011
109views more  JISE 2011»
13 years 6 days ago
Attribute-Based Key-Insulated Encryption
Jian-Hong Chen, Yong-Tao Wang, Ke-Fei Chen
ACISP
2010
Springer
13 years 6 months ago
Attribute-Based Authenticated Key Exchange
We introduce the concept of attribute-based authenticated key exchange (AB-AKE) within the framework of ciphertext policy attribute-based systems. A notion of AKE-security for AB-A...
M. Choudary Gorantla, Colin Boyd, Juan Manuel Gonz...
CCS
2006
ACM
13 years 9 months ago
Attribute-based encryption for fine-grained access control of encrypted data
As more sensitive data is shared and stored by third-party sites on the Internet, there will be a need to encrypt data stored at these sites. One drawback of encrypting data, is t...
Vipul Goyal, Omkant Pandey, Amit Sahai, Brent Wate...
CCS
2007
ACM
13 years 11 months ago
Attribute-based encryption with non-monotonic access structures
We construct an Attribute-Based Encryption (ABE) scheme that allows a user’s private key to be expressed in terms of any access formula over attributes. Previous ABE schemes wer...
Rafail Ostrovsky, Amit Sahai, Brent Waters