Sciweavers

36 search results - page 4 / 8
» Decentralizing Attribute-Based Encryption
Sort
View
ISCI
2010
105views more  ISCI 2010»
13 years 7 months ago
Secure threshold multi authority attribute based encryption without a central authority
Huang Lin, Zhenfu Cao, Xiaohui Liang, Jun Shao
JISE
2011
109views more  JISE 2011»
13 years 4 months ago
Attribute-Based Key-Insulated Encryption
Jian-Hong Chen, Yong-Tao Wang, Ke-Fei Chen
ACISP
2010
Springer
13 years 10 months ago
Attribute-Based Authenticated Key Exchange
We introduce the concept of attribute-based authenticated key exchange (AB-AKE) within the framework of ciphertext policy attribute-based systems. A notion of AKE-security for AB-A...
M. Choudary Gorantla, Colin Boyd, Juan Manuel Gonz...
CCS
2006
ACM
14 years 24 days ago
Attribute-based encryption for fine-grained access control of encrypted data
As more sensitive data is shared and stored by third-party sites on the Internet, there will be a need to encrypt data stored at these sites. One drawback of encrypting data, is t...
Vipul Goyal, Omkant Pandey, Amit Sahai, Brent Wate...
CCS
2007
ACM
14 years 3 months ago
Attribute-based encryption with non-monotonic access structures
We construct an Attribute-Based Encryption (ABE) scheme that allows a user’s private key to be expressed in terms of any access formula over attributes. Previous ABE schemes wer...
Rafail Ostrovsky, Amit Sahai, Brent Waters