Cited By
View all- Zhao LChoi JDemirag DButler KMannan MAyday EClark J(2019)One-Time Programs Made PracticalFinancial Cryptography and Data Security10.1007/978-3-030-32101-7_37(646-666)Online publication date: 30-Sep-2019
Code-based public key encryption (PKE) is a popular choice to achieve post-quantum security, partly due to its capability to achieve fast encryption/decryption. However, code-based PKE has larger ciphertext and public key sizes in comparison to ...
With the development of the electronic commerce (e-commerce), the untraceable electronic cash is an attractive payment tool for e-commerce, because its anonymity property can ensure the privacy of spenders. Recently, Ziba et al. proposed a new ...
A multi-authority attribute-based access control system for cloud storage is proposed.An adaptively secure multi-authority CP-ABE (MA-CP-ABE) scheme in the standard model.A decryption outsourcing method for the proposed MA-CP-ABE scheme.An attribute-...
Association for Computing Machinery
New York, NY, United States
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in