Back to Results
First PageMeta Content
RSA / Cipher / Cyberwarfare / Applied mathematics / Security / Cryptography / Public-key cryptography / Electronic commerce


Security Weaknesses of an “Anonymous Attribute Based Encryption” appeared in ASIACCS’13 Payal Chaudhari, Manik Lal Das, Anish Mathuria DA-IICT, Gandhinagar, India {payal chaudhari, maniklal das, anish mathuria}@dai
Add to Reading List

Document Date: 2015-01-05 08:05:41


Open Document

File Size: 249,64 KB

Share Result on Facebook

City

Policy Attribute / /

/

Holiday

Assumption / /

IndustryTerm

setup algorithm / probabilistic polynomial time algorithm / probabilistic algorithm / probabilistic polynomial-time algorithm / real applications / decryption algorithm / cloud computing vast volume / /

Organization

Attribute Center / /

Person

Student / Dean / Manik Lal Das / Di / /

Position

Teacher / Dean / Dean / Teacher / /

Product

M-16 / /

SportsEvent

SKL / i SKL / /

Technology

Encryption / Cryptography / Anonymous Attribute Based Encryption / anish mathuria}@daiict.ac.in Abstract Attribute-based Encryption / Anonymous Attributebased Encryption / public key / Ciphertext-Policy Attribute-Based Encryption / setup algorithm / private key / secret key / Privacy-aware Attribute-based Encryption / probabilistic polynomial-time algorithm / DLP / decryption algorithm / probabilistic polynomial time algorithm / four algorithms / probabilistic algorithm / Attribute-based encryption / /

SocialTag