Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products
- 4 April 2008
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC
Abstract
No abstract availableKeywords
This publication has 14 references indexed in Scilit:
- Conjunctive, Subset, and Range Queries on Encrypted DataPublished by Springer Science and Business Media LLC ,2007
- Ciphertext-Policy Attribute-Based EncryptionPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2007
- Attribute-based encryption for fine-grained access control of encrypted dataPublished by Association for Computing Machinery (ACM) ,2006
- Escrow-free encryption supporting cryptographic workflowInternational Journal of Information Security, 2006
- Practical Identity-Based Encryption Without Random OraclesLecture Notes in Computer Science, 2006
- Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)Lecture Notes in Computer Science, 2006
- Policy-Based Cryptography and ApplicationsLecture Notes in Computer Science, 2005
- Identity-Based Encryption from the Weil PairingSIAM Journal on Computing, 2003
- An Identity Based Encryption Scheme Based on Quadratic ResiduesLecture Notes in Computer Science, 2001
- Public-key cryptosystems provably secure against chosen ciphertext attacksPublished by Association for Computing Machinery (ACM) ,1990