Back to Results
First PageMeta Content
Cipher / Chosen-plaintext attack / Broadcast encryption / Chosen-ciphertext attack / RSA / Cramer–Shoup cryptosystem / Paillier cryptosystem / Cryptography / Public-key cryptography / Ciphertext


Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data Vipul Goyal∗ Omkant Pandey†
Add to Reading List

Document Date: 2012-05-29 07:38:50


Open Document

File Size: 285,57 KB

Share Result on Facebook

City

Policy Attribute / Hierarchical Identity / Fuzzy Identity / Attributed / /

Company

G2 / G1 / Google / Intel / Yahoo / /

Currency

pence / /

IndustryTerm

recursive algorithm / Fine-grained access control systems / storage server / probabilistic polynomial-time algorithm / software vulnerability exploit / software checks / decryption algorithm / web portal sites / bilinear / Internet traffic logs / given decryption algorithm / encryption algorithm / rudimentary decryption algorithm / /

Organization

National Science Foundation / United States Army / Department of Homeland Security / Department of Interior / /

Person

Amit Sahai‡ Brent Waters / /

Position

author / dealer / /

ProgrammingLanguage

C / /

Technology

Encryption / given decryption algorithm / error-tolerant encryption / randomized algorithm / public key / encryption algorithm / Setup algorithm / Identity-Based Encryption / rudimentary decryption algorithm / The algorithm / private key / secret key / probabilistic polynomial-time algorithm / simulation / decryption algorithm / recursive algorithm / four algorithms / attribute-based encryption / /

URL

dshield.org / /

SocialTag