Attribute-based encryption for fine-grained access control of encrypted data
Top Cited Papers
- 30 October 2006
- proceedings article
- Published by Association for Computing Machinery (ACM)
Abstract
No abstract availableKeywords
This publication has 27 references indexed in Scilit:
- Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based EncryptionLecture Notes in Computer Science, 2005
- No Registration Needed: How to Use Declarative Policies and Negotiation to Access Sensitive Resources on the Semantic WebLecture Notes in Computer Science, 2004
- Efficient Selective-ID Secure Identity-Based Encryption Without Random OraclesLecture Notes in Computer Science, 2004
- Public Key Encryption with Keyword SearchLecture Notes in Computer Science, 2004
- Chosen-Ciphertext Security from Identity-Based EncryptionLecture Notes in Computer Science, 2004
- A Forward-Secure Public-Key Encryption SchemeLecture Notes in Computer Science, 2003
- The LSD Broadcast Encryption SchemeLecture Notes in Computer Science, 2002
- An Identity Based Encryption Scheme Based on Quadratic ResiduesLecture Notes in Computer Science, 2001
- Cryptographic Solution to a Multilevel Security ProblemPublished by Springer Nature ,1983
- How to share a secretCommunications of the ACM, 1979