Sciweavers

6 search results - page 1 / 2
» Key-Policy Multi-authority Attribute-Based Encryption
Sort
View
ISCI
2010
105views more  ISCI 2010»
13 years 9 months ago
Secure threshold multi authority attribute based encryption without a central authority
Huang Lin, Zhenfu Cao, Xiaohui Liang, Jun Shao
IJNSEC
2010
133views more  IJNSEC 2010»
13 years 5 months ago
Verifiable Attribute Based Encryption
In this paper, we construct two verifiable attribute-based encryption (VABE) schemes. One is with a single authority, and the other is with multi authorities. Not only our schemes ...
Qiang Tang, Dongyao Ji
EUROCRYPT
2011
Springer
13 years 2 months ago
Decentralizing Attribute-Based Encryption
We propose a Multi-Authority Attribute-Based Encryption (ABE) system. In our system, any party can become an authority and there is no requirement for any global coordination othe...
Allison B. Lewko, Brent Waters
CCS
2006
ACM
14 years 2 months ago
Attribute-based encryption for fine-grained access control of encrypted data
As more sensitive data is shared and stored by third-party sites on the Internet, there will be a need to encrypt data stored at these sites. One drawback of encrypting data, is t...
Vipul Goyal, Omkant Pandey, Amit Sahai, Brent Wate...
CRYPTO
2012
Springer
327views Cryptology» more  CRYPTO 2012»
12 years 1 months ago
Functional Encryption for Regular Languages
We provide a functional encryption system that supports functionality for regular languages. In our system a secret key is associated with a Deterministic Finite Automata (DFA) M....
Brent Waters