Delegating Capabilities in Predicate Encryption Systems
- 12 August 2008
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
Abstract
No abstract availableKeywords
This publication has 19 references indexed in Scilit:
- Multi-authority Attribute Based EncryptionPublished by Springer Science and Business Media LLC ,2007
- Ciphertext-Policy Attribute-Based EncryptionPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2007
- Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)Lecture Notes in Computer Science, 2006
- Hierarchical Identity Based Encryption with Constant Size CiphertextLecture Notes in Computer Science, 2005
- Communicating Sequential Processes. The First 25 YearsLecture Notes in Computer Science, 2005
- Public Key Encryption with Keyword SearchLecture Notes in Computer Science, 2004
- Chosen-Ciphertext Security from Identity-Based EncryptionLecture Notes in Computer Science, 2004
- A Forward-Secure Public-Key Encryption SchemeLecture Notes in Computer Science, 2003
- An Identity Based Encryption Scheme Based on Quadratic ResiduesLecture Notes in Computer Science, 2001
- Identity-Based Encryption from the Weil PairingLecture Notes in Computer Science, 2001