Funder
National Science and Technology Council
Subject
Law,Hardware and Architecture,Software,General Computer Science,Computer Science Applications
Reference72 articles.
1. Predicate encryption supporting disjunctions, polynomial equations, and inner products;Katz,2008
2. An efficient predicate encryption with constant pairing computations and minimum costs;Kim;IEEE Trans. Comput.,2016
3. Inner-product encryption under standard assumptions;Park;Des. Codes Cryptogr.,2011
4. Attribute-hiding predicate encryption with equality test in cloud computing;Sun;IEEE Access,2018
5. Identity-based encryption from the weil pairing;Boneh,2001