Search

Your search keyword '"puncturable encryption"' showing total 25 results

Search Constraints

Start Over You searched for: Descriptor "puncturable encryption" Remove constraint Descriptor: "puncturable encryption"
25 results on '"puncturable encryption"'

Search Results

1. Conjunctive searchable encryption with efficient authorization for group sharing.

2. Attribute-Based Searchable Encryption With Forward Security for Cloud-Assisted IoT

5. Puncturable ciphertext-policy attribute-based encryption scheme for efficient and flexible user revocation.

7. Incremental symmetric puncturable encryption with support for unbounded number of punctures.

8. Puncturable Search: Enabling Authorized Search in Cross-data Federation

9. Puncturable Identity-Based Encryption from Lattices

10. Fine-Grained Forward Secrecy: Allow-List/Deny-List Encryption and Applications

11. Towards secure asynchronous messaging with forward secrecy and mutual authentication.

12. Backward private dynamic searchable encryption with update pattern.

13. CCA-Secure (Puncturable) KEMs from Encryption with Non-Negligible Decryption Errors

14. Puncturable Encryption: A Generic Construction from Delegatable Fully Key-Homomorphic Encryption

15. Public-Key Puncturable Encryption: Modular and Compact Constructions

16. Puncturable identity-based and attribute-based encryption from lattices.

17. Puncturable-based broadcast encryption with tracking for preventing malicious encryptors in cloud file sharing.

18. Forward-Secure Puncturable Identity-Based Encryption for Securing Cloud Emails

19. Puncturable Proxy Re-Encryption Supporting to Group Messaging Service

20. Communication-Efficient and Fine-Grained Forward-Secure Asynchronous Messaging.

21. Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange

22. Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange.

23. Forward and backward secure keyword search with flexible keyword shielding.

24. System-widely and fine-grained forward secure identity-based signature scheme.

25. T0RTT: Non-Interactive Immediate Forward-Secret Single-Pass Circuit Construction

Catalog

Books, media, physical & digital resources