Fully secure attribute-based broadcast encryption

被引:0
|
作者
机构
[1] [1,Sun, Jin
[2] Hu, Yupu
来源
Sun, J. (oksunjin@xaut.edu.cn) | 2012年 / Science Press卷 / 39期
关键词
14;
D O I
10.3969/j.issn.1001-2400.2012.04.005
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [31] Secure and efficient attribute-based encryption with keyword search
    Dong, Xiaolei (dongxiaolei@sei.ecnu.edu.cn), 1600, Oxford University Press (61):
  • [32] Fine-Grained Secure Attribute-Based Encryption
    Yuyu Wang
    Jiaxin Pan
    Yu Chen
    Journal of Cryptology, 2023, 36
  • [33] A fully distributed hierarchical attribute-based encryption scheme
    Ali, Mohammad
    Mohajeri, Javad
    Sadeghi, Mohammad-Reza
    Liu, Ximeng
    THEORETICAL COMPUTER SCIENCE, 2020, 815 : 25 - 46
  • [34] Ciphertext-Policy Attribute-Based Broadcast Encryption Scheme
    Asim, Muhammad
    Ibraimi, Luan
    Petkovic, Milan
    COMMUNICATIONS AND MULTIMEDIA SECURITY, 2011, 7025 : 244 - +
  • [35] Fully Secure Hidden Ciphertext-Policy Attribute-Based Proxy Re-encryption
    Feng, Xinyu
    Li, Cong
    Li, Dan
    Fang, Yuejian
    Shen, Qingni
    INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2017, 2018, 10631 : 192 - 204
  • [36] A Fully Secure Ciphertext-Policy Attribute-Based Encryption With a Tree-Based Access Structure
    Rifki, Sadikin
    Park, YoungHo
    Moon, SangJae
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2015, 31 (01) : 247 - 265
  • [37] Compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption
    Minh Ha Le
    Vinh Duc Tran
    Van Anh Trinh
    Viet Cuong Trinh
    THEORETICAL COMPUTER SCIENCE, 2020, 804 : 219 - 235
  • [38] Fully secure bandwidth-efficient anonymous ciphertext-policy attribute-based encryption
    Rao, Y. Sreenivasa
    Dutta, Ratna
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 4157 - 4176
  • [39] Fully secure ciphertext policy attribute-based encryption with constant length ciphertext and faster decryption
    Doshi, Nishant
    Jinwala, Devesh C.
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (11) : 1988 - 2002
  • [40] Fully secure predicate-based broadcast encryption
    Sun, Jin
    Hu, Yupu
    Wang, Shangping
    Journal of Computational Information Systems, 2014, 10 (02): : 611 - 618