Back to Results
First PageMeta Content
Ciphertext indistinguishability / Ciphertext / Security / Semantic security / RSA / Applied mathematics / Cryptography / Homomorphic encryption / Cyberwarfare


Policy-Based Non-interactive Outsourcing of Computation using multikey FHE and CP-ABE∗ Michael Clear† and Ciar´an McGoldrick School of Computer Science and Statistics, Trinity College Dublin {clearm, Ciaran.McGoldri
Add to Reading List

Document Date: 2013-12-29 11:13:19


Open Document

File Size: 420,97 KB

Share Result on Facebook

Company

Gt / /

Currency

USD / /

/

Facility

Trinity College / /

IndustryTerm

polynomial-time algorithms / evaluation algorithm / Access control systems / decryption algorithm / cloud computing / /

Organization

CP-ABE∗ Michael Clear† and Ciar´an McGoldrick School of Computer Science and Statistics / FHE / Trinity College Dublin / Trusted Authority / /

Person

Michael Clear / /

Position

author / INDNA-CPA / IND-CPA / IND-NA-CPA / dealer at system initialization time / evaluator / IND-AD-CPA / dealer / /

Technology

encryption / interactive MPC protocol / multikey FHE algorithm / following algorithm / modified MkTree algorithm / PPT algorithm / public key / MPC protocol / Eval algorithm / Dec algorithm / polynomial-time algorithms / PKI / evaluation algorithm / 1.3 Related Work Homomorphic encryption / 4 Policy-Based Homomorphic Encryption / Extract algorithms / multikey homomorphic encryption / private key / secret key / primitive policy-based homomorphic encryption / simulation / PPT algorithms / decryption algorithm / policy-based homomorphic encryption / functional encryption / attribute-based encryption / /

SocialTag