Cryptology ePrint Archive: Report 2014/471

Available versions in chronological order


Large Universe Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability
Jianting Ning, Zhenfu Cao, Xiaolei Dong, Lifei Wei, and Xiaodong Lin
Original publication (with minor differences): It has been accepted by ESORICS 2014. This is a full version.

Large Universe Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability
Jianting Ning, Zhenfu Cao, Xiaolei Dong, Lifei Wei, and Xiaodong Lin
Original publication (with minor differences): It has been accepted by ESORICS 2014. This is a full version.

Large Universe Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability
Jianting Ning, Zhenfu Cao, Xiaolei Dong, Lifei Wei, and Xiaodong Lin
Original publication (with minor differences): Accepted by European Symposium on Research in Computer Security (ESORICS) 2014. This is a full version.

Large Universe Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability
Jianting Ning, Zhenfu Cao, Xiaolei Dong, Lifei Wei, and Xiaodong Lin
Original publication (with minor differences): Accepted by European Symposium on Research in Computer Security (ESORICS) 2014. This is a full version.

Large Universe Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability
Jianting Ning, Zhenfu Cao, Xiaolei Dong, Lifei Wei, and Xiaodong Lin
Original publication (with minor differences): Accepted by European Symposium on Research in Computer Security (ESORICS) 2014. This is a full version.

Large Universe Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability
Jianting Ning, Zhenfu Cao, Xiaolei Dong, Lifei Wei, and Xiaodong Lin
Original publication (with minor differences): Accepted by European Symposium on Research in Computer Security (ESORICS) 2014. This is a full version.

Large Universe Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability
Jianting Ning, Zhenfu Cao, Xiaolei Dong, Lifei Wei, and Xiaodong Lin
Original publication (with minor differences): Accepted by European Symposium on Research in Computer Security (ESORICS) 2014. This is a full version.


[ Cryptology ePrint archive ]