×
Abstract. With the advances of cloud computing, data sharing becomes easier for large-scale enterprises. When deploying privacy and security schemes in data ...
In a revocable broadcast encryption scheme, the group manager can flexibly set revoked users who cannot decrypt the ciphertext. Many applications of the ...
Bibliographic details on Compact CCA2-secure Hierarchical Identity-Based Broadcast Encryption for Fuzzy-entity Data Sharing.
Compact CCA2-secure Hierarchical Identity-Based Broadcast Encryption for Fuzzy-Entity Data Sharing. Weiran Liu , Jianwei Liu , Qianhong Wu , Bo Qin , David ...
We focus on practical Hierarchical Identity-Based Broadcast Encryption (HIBBE) with semantic security against adaptively chosen-ciphertext attacks (CCA2) in the ...
This work proposes a traceable CP-ABE scheme with attribute-level user revocation for cloud storage (TUR-CPABE), which has the ability to trace malicious ...
Compact CCA2-secure Hierarchical Identity-Based Broadcast Encryption for Fuzzy-entity Data Sharing . Weiran Liu, Jianwei Liu, Qianhong Wu, Bo Qin, David ...
May 20, 2020 · Naccache, and H. Ferradi. Compact CCA2-secure hierarchical identity-based broadcast encryption for fuzzy-entity data sharing. Cryptology ...
Conjunctive broadcast and attribute-based encryption. ... Compact CCA2-secure hierarchical identity-based broadcast encryption for fuzzy-entity data sharing.
Compact CCA2-secure Hierarchical Identity-Based Broadcast Encryption for Fuzzy-entity Data Sharing ... and flexible rekeying strategies and is a very ...