Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Attribute-based encryption

Known as: Abe, Attribute based encryption 
Attribute-based encryption is a type of public-key encryption in which the secret key of a user and the ciphertext are dependent upon attributes (e.g… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2011
Highly Cited
2011
  • B. Waters
  • Public Key Cryptography
  • 2011
  • Corpus ID: 2053208
We present a new methodology for realizing Ciphertext-Policy Attribute Encryption (CP-ABE) under concrete and noninteractive… Expand
  • table 1
Is this relevant?
Highly Cited
2010
Highly Cited
2010
We propose a Multi-Authority Attribute-Based Encryption (ABE) system. In our system, any party can become an authority and there… Expand
  • table 1
Is this relevant?
Highly Cited
2010
Highly Cited
2010
We present two fully secure functional encryption schemes: a fully secure attribute-based encryption (ABE) scheme and a fully… Expand
  • table 1
  • table 2
Is this relevant?
Highly Cited
2009
Highly Cited
2009
  • M. Chase, S. Chow
  • ACM Conference on Computer and Communications…
  • 2009
  • Corpus ID: 207176675
Attribute based encryption (ABE) [13] determines decryption ability based on a user's attributes. In a multi-authority ABE scheme… Expand
  • figure 1
  • table 1
Is this relevant?
Highly Cited
2008
Highly Cited
2008
In a ciphertext policy attribute based encryption system, a user's private key is associated with a set of attributes (describing… Expand
Is this relevant?
Highly Cited
2007
Highly Cited
2007
In several distributed systems a user should only be able to access data if a user posses a certain set of credentials or… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
Is this relevant?
Highly Cited
2007
Highly Cited
2007
We construct an Attribute-Based Encryption (ABE) scheme that allows a user's private key to be expressed in terms of any access… Expand
Is this relevant?
Highly Cited
2007
Highly Cited
2007
In an identity based encryption scheme, each user is identified by a unique identity string. An attribute based encryption scheme… Expand
Is this relevant?
Highly Cited
2006
Highly Cited
2006
As more sensitive data is shared and stored by third-party sites on the Internet, there will be a need to encrypt data stored at… Expand
Is this relevant?
Highly Cited
2004
Highly Cited
2004
We introduce a new type of Identity-Based Encryption (IBE) scheme that we call Fuzzy Identity-Based Encryption. In Fuzzy IBE we… Expand
Is this relevant?