Top results
fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption allison lewko1 ?, tatsuaki okamoto2, amit sahai3 ??, katsuyuki…
powerpoint presentation fully secure multi-authority ciphertext-policy attribute-based encryption without random oracles zhen liu1,2 1 shanghai jiao tong university, shanghai,…
slide 1fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption allison lewko the university of texas at austin tatsuaki…
control cloud data access privilege and anonymity with fully anonymous attribute-based encryption a fully anonymous attribute-based encryption to control cloud data access…
1 fully secure unbounded inner-product and attribute-based encryption 2012 12 4 tatsuaki okamoto ntt katsuyuki takashima mitsubishi electric 2 functional encryption plain…
attribute-based encryption (20110705) threshold abe (20110719) kp-abe (20110719) cp-abe (20111003) v2 * attribute-based encryption [sw05] threshold abe [gpsw06] key-policy…
volume no: 2 (2015), issue no: 3 (march) march 2015 www.ijmetmr.com page 328 issn no: 2348-4845 international journal & magazine of engineering, technology, management…
hybrid attribute-based encryption and re-encryption for scalable mobile applications in clouds piotr k. tysowski and m. anwarul hasan dept. of electrical & computer engineering…
ciphertext-policy, attribute-based encryption brent waters sri international john bethencourt cmu amit sahai ucla what is ciphertext-policy attribute-based encryption (cp-abe)?…
ciphertext-policy attribute-based encryption online/offline attribute-based encryption brent waters susan hohenberger presented by shai halevi test access control by encryption…
ciphertext-policy, attribute-based encryption brent waters sri international john bethencourt cmu amit sahai ucla * what is ciphertext-policy attribute-based encryption (cp-abe)?…
encryption tatsuaki okamoto ntt abstract in this paper, we present two fully secure functional encryption schemes. our first result is a fully secure attribute-based encryption
control cloud data access privilege and anonymity with fully anonymous attribute-based encryption taeho jung, xiang-yang li, senior member, ieee, zhiguo wan, and meng wan,…
international journal of computer applications 0975 – 8887 volume 103 – no.10, october 2014 9 message privacy with load balancing using attribute based encryption jyoti…
1 university of westminster, london, united kingdom {h.dang,a.ullah}@westminster.ac.uk 2 tampere university, tampere, finland {antonios.michalas,alexandros.bakas}@tuni.fi
international journal of computational intelligence and informatics, vol. 5: no. 3, december 2015 issn: 2349 - 6363 244 hybrid algorithms tor-rct-trem v.poongodi1 1research
fame: fast attribute-based message encryption∗ be the natural cryptographic tool for building various types of conditional access systems with far-reaching applications,
privacy preserving attribute-based encryption with conjunctive keyword search for e-health records in cloudjuly 2021, volume 13, number 2 (pp. 87–100) http://www.isecure-journal.org
qi li ,1,2,3 hongbo zhu,3 zuobin ying,4 and tao zhang5 1 school of computer science, nanjing university of posts and telecommunications, nanjing 210023, china 2jiangsu key
china summer school on lattices and cryptography craig gentry and shai halevi june 3 2014 fully homomorphic encryption and bootstrapping fully homomorphic encryption fhe…