Provably secure and efficient bounded ciphertext policy attribute based encryption

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Original languageEnglish
Title of host publicationProceedings of the 4th International Symposium on ACM Symposium on Information, Computer and Communications Security, ASIACCS'09
Pages343-352
Number of pages10
DOIs
StatePublished - 2009
Event4th International Symposium on ACM Symposium on Information, Computer and Communications Security, ASIACCS'09 - Sydney, NSW, Australia
Duration: Mar 10 2009Mar 12 2009

Publication series

NameProceedings of the 4th International Symposium on ACM Symposium on Information, Computer and Communications Security, ASIACCS'09

Conference

Conference4th International Symposium on ACM Symposium on Information, Computer and Communications Security, ASIACCS'09
Country/TerritoryAustralia
CitySydney, NSW
Period3/10/093/12/09

ASJC Scopus Subject Areas

  • Computational Theory and Mathematics
  • Computer Networks and Communications
  • Computer Science Applications

Keywords

  • Access control
  • Attribute based encryption
  • Public key cryptography

Fingerprint

Dive into the research topics of 'Provably secure and efficient bounded ciphertext policy attribute based encryption'. Together they form a unique fingerprint.

Cite this