Sciweavers

137 search results - page 4 / 28
» Verifiable Attribute Based Encryption
Sort
View
ISCI
2010
105views more  ISCI 2010»
14 years 10 months ago
Secure threshold multi authority attribute based encryption without a central authority
Huang Lin, Zhenfu Cao, Xiaohui Liang, Jun Shao
JISE
2011
109views more  JISE 2011»
14 years 6 months ago
Attribute-Based Key-Insulated Encryption
Jian-Hong Chen, Yong-Tao Wang, Ke-Fei Chen
ACISP
2010
Springer
15 years 1 months ago
Attribute-Based Authenticated Key Exchange
We introduce the concept of attribute-based authenticated key exchange (AB-AKE) within the framework of ciphertext policy attribute-based systems. A notion of AKE-security for AB-A...
M. Choudary Gorantla, Colin Boyd, Juan Manuel Gonz...
ACNS
2010
Springer
187views Cryptology» more  ACNS 2010»
15 years 3 months ago
Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs
Verifiably encrypted signature schemes (VES) allow a signer to encrypt his or her signature under the public key of a trusted third party, while maintaining public signature verifi...
Markus Rückert, Michael Schneider 0002, Domin...
CCS
2006
ACM
15 years 3 months ago
Attribute-based encryption for fine-grained access control of encrypted data
As more sensitive data is shared and stored by third-party sites on the Internet, there will be a need to encrypt data stored at these sites. One drawback of encrypting data, is t...
Vipul Goyal, Omkant Pandey, Amit Sahai, Brent Wate...