How to construct interval encryption from binary tree encryption

  • Huang Lin
  • , Zhenfu Cao
  • , Xiaohui Liang
  • , Muxin Zhou
  • , Haojin Zhu
  • , Dongsheng Xing

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Original languageEnglish
Title of host publicationApplied Cryptography and Network Security - 8th International Conference, ACNS 2010, Proceedings
Pages19-34
Number of pages16
DOIs
StatePublished - 2010
Event8th International Conference on Applied Cryptography and Network Security, ACNS 2010 - Beijing, China
Duration: Jun 22 2010Jun 25 2010

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume6123 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference8th International Conference on Applied Cryptography and Network Security, ACNS 2010
Country/TerritoryChina
CityBeijing
Period6/22/106/25/10

ASJC Scopus Subject Areas

  • Theoretical Computer Science
  • General Computer Science

Keywords

  • Binary tree encryption
  • Hierarchical IBE
  • Interval encryption
  • Public key broadcast encryption

Fingerprint

Dive into the research topics of 'How to construct interval encryption from binary tree encryption'. Together they form a unique fingerprint.

Cite this