-
1
-
-
84921018856
-
A practical and provably secure coalition-resistant group signature scheme
-
Bellare, M, ed, CRYPTO 2000, Springer, Heidelberg
-
Ateniese, G., Camenisch, J., Joye, M., Tsudik, G.: A practical and provably secure coalition-resistant group signature scheme. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 255-270. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1880
, pp. 255-270
-
-
Ateniese, G.1
Camenisch, J.2
Joye, M.3
Tsudik, G.4
-
2
-
-
67049091537
-
-
Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. In: Internet Society (ISOC): NDSS 2005, pp. 29-43 (2005)
-
Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. In: Internet Society (ISOC): NDSS 2005, pp. 29-43 (2005)
-
-
-
-
3
-
-
33745218758
-
Improved proxy re-encryption schemes with applications to secure distributed storage
-
Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Transactions on Information and System Security (TISSEC) 9(1), 1-30 (2006)
-
(2006)
ACM Transactions on Information and System Security (TISSEC)
, vol.9
, Issue.1
, pp. 1-30
-
-
Ateniese, G.1
Fu, K.2
Green, M.3
Hohenberger, S.4
-
4
-
-
79251578513
-
On the (im)possibility of obfuscating programs
-
Kilian, J, ed, CRYPTO 2001, Springer, Heidelberg
-
Barak, B., Goldreich, O., Impagliazzo, R., Rudich, S., Sahai, A., Vadhan, S.P., Yang, K.: On the (im)possibility of obfuscating programs. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 1-18. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2139
, pp. 1-18
-
-
Barak, B.1
Goldreich, O.2
Impagliazzo, R.3
Rudich, S.4
Sahai, A.5
Vadhan, S.P.6
Yang, K.7
-
5
-
-
84937428623
-
Efficient algorithms for pairing-based cryptosystems
-
Yung, M, ed, CRYPTO 2002, Springer, Heidelberg
-
Lynn, H.Y., Scott, B., Barreto, M., Kim, P.S.L.M.: Efficient algorithms for pairing-based cryptosystems. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 354-369. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2442
, pp. 354-369
-
-
Lynn, H.Y.1
Scott, B.2
Barreto, M.3
Kim, P.S.L.M.4
-
6
-
-
84957718934
-
Divertible protocols and atomic proxy cryptography
-
Nyberg, K, ed, EUROCRYPT 1998, Springer, Heidelberg
-
Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127-144. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1403
, pp. 127-144
-
-
Blaze, M.1
Bleumer, G.2
Strauss, M.3
-
7
-
-
0345058960
-
A simple public-key cryptosystem with a double trapdoor decryption mechanism and its applications
-
Laih, C.-S, ed, ASIACRYPT 2003, Springer, Heidelberg
-
Bresson, E., Catalano, D., Pointcheval, D.: A simple public-key cryptosystem with a double trapdoor decryption mechanism and its applications. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 37-54. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2894
, pp. 37-54
-
-
Bresson, E.1
Catalano, D.2
Pointcheval, D.3
-
8
-
-
84958612917
-
-
Camenisch, J., Stadler, M.: Efficient group signature schemes for large groups. In: Sommer, G., Daniilidis, K., Pauli, J. (eds.) CAIP 1997. LNCS, 1296, pp. 410-424. Springer, Heidelberg (1997)
-
Camenisch, J., Stadler, M.: Efficient group signature schemes for large groups. In: Sommer, G., Daniilidis, K., Pauli, J. (eds.) CAIP 1997. LNCS, vol. 1296, pp. 410-424. Springer, Heidelberg (1997)
-
-
-
-
9
-
-
77952361637
-
Chosen-ciphertext secure proxy re-encryption. In: ACM CCS, 2007. Full version: Cryptology ePrint Archieve
-
Report 2007/171
-
Canetti, R., Hohenberger, S.: Chosen-ciphertext secure proxy re-encryption. In: ACM CCS, 2007. Full version: Cryptology ePrint Archieve: Report 2007/171 (2007)
-
(2007)
-
-
Canetti, R.1
Hohenberger, S.2
-
10
-
-
33646735175
-
Secure multicast using proxy encryption
-
Qing,S, Mao,W.,Lopez, J, Wang, G, eds, ICICS 2005, Springer, Heidelberg
-
Chiu, Y.-P., Lei, C.-L., Huang, C.-Y.: Secure multicast using proxy encryption. In: Qing,S., Mao,W.,Lopez, J., Wang, G. (eds.) ICICS 2005. LNCS, vol. 3783, pp. 280-290. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3783
, pp. 280-290
-
-
Chiu, Y.-P.1
Lei, C.-L.2
Huang, C.-Y.3
-
11
-
-
38149038713
-
-
Chu, C., Tzeng, W.: Identity-based proxy re-encryption without random oracles. In: Garay, J.A., Lenstra, A.K., Mambo, M., Peralta, R. (eds.) ISC 2007. LNCS, 4779, pp. 189-202. Springer, Heidelberg (2007)
-
Chu, C., Tzeng, W.: Identity-based proxy re-encryption without random oracles. In: Garay, J.A., Lenstra, A.K., Mambo, M., Peralta, R. (eds.) ISC 2007. LNCS, vol. 4779, pp. 189-202. Springer, Heidelberg (2007)
-
-
-
-
12
-
-
84870707379
-
A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
-
Krawczyk, H, ed, CRYPTO 1998, Springer, Heidelberg
-
Cramer, R., Shoup, V.: A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 13-25. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1462
, pp. 13-25
-
-
Cramer, R.1
Shoup, V.2
-
13
-
-
58449122500
-
Chosen-ciphertext secure proxy re- encryption schemes without pairings
-
CANS, springer, Heidelberg
-
Deng, R.H., Weng, J., Liu, S., Chen, K.: Chosen-ciphertext secure proxy re- encryption schemes without pairings. In: CANS 2008. LNCS, vol. 5339, pp. 1-17. springer, Heidelberg (2008), http://eprint.iacr.org/2008/509
-
(2008)
LNCS
, vol.5339
, pp. 1-17
-
-
Deng, R.H.1
Weng, J.2
Liu, S.3
Chen, K.4
-
14
-
-
84956859011
-
-
Fujisaki, E., Okamoto, T.: How to enhance the security of public-key encryption at minimum cost. In: Imai, H., Zheng, Y. (eds.) PKC 1999. LNCS, 1560, pp. 53-68. Springer, Heidelberg (1999)
-
Fujisaki, E., Okamoto, T.: How to enhance the security of public-key encryption at minimum cost. In: Imai, H., Zheng, Y. (eds.) PKC 1999. LNCS, vol. 1560, pp. 53-68. Springer, Heidelberg (1999)
-
-
-
-
15
-
-
84955339164
-
Secure integration ofasymmetric and symmetric encryption schemes
-
Wiener, M, ed, CRYPTO 1999, Springer, Heidelberg
-
Fujisaki, E., Okamoto, T.: Secure integration ofasymmetric and symmetric encryption schemes. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 537-554. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1666
, pp. 537-554
-
-
Fujisaki, E.1
Okamoto, T.2
-
16
-
-
33748600953
-
On the impossibility of obfuscation with auxiliary input
-
Goldwasser, S., Kalai, Y.T.: On the impossibility of obfuscation with auxiliary input. In: FOCS 2005, pp. 553-562 (2005)
-
(2005)
FOCS 2005
, pp. 553-562
-
-
Goldwasser, S.1
Kalai, Y.T.2
-
17
-
-
38049061546
-
-
Green, M., Ateniese, G.: Identity-based proxy re-encryption. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, 4521, pp. 288-306. Springer, Heidelberg (2007); full version: Cryptology ePrint Archieve: Report 2006/473
-
Green, M., Ateniese, G.: Identity-based proxy re-encryption. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 288-306. Springer, Heidelberg (2007); full version: Cryptology ePrint Archieve: Report 2006/473
-
-
-
-
18
-
-
84937414062
-
Zero-knowledge and code obfuscation
-
Okamoto, T, ed, ASI-ACRYPT 2000, Springer, Heidelberg
-
Hada, S.: Zero-knowledge and code obfuscation. In: Okamoto, T. (ed.) ASI-ACRYPT 2000. LNCS, vol. 1976, pp. 443-457. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1976
, pp. 443-457
-
-
Hada, S.1
-
19
-
-
70349149683
-
-
Heydt-Benjamin, T.S., Chae, H., Defend, B., Fu, K.: Privacy for public transportation. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, 4258, pp. 1-19. Springer, Heidelberg (2006)
-
Heydt-Benjamin, T.S., Chae, H., Defend, B., Fu, K.: Privacy for public transportation. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol. 4258, pp. 1-19. Springer, Heidelberg (2006)
-
-
-
-
20
-
-
38049073133
-
-
Hohenberger, S., Rothblum, G.N., Shelat, A., Vaikuntanathan, V.: Securely obfuscating re-encryption. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, 4392, pp. 233-252. Springer, Heidelberg (2007)
-
Hohenberger, S., Rothblum, G.N., Shelat, A., Vaikuntanathan, V.: Securely obfuscating re-encryption. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 233-252. Springer, Heidelberg (2007)
-
-
-
-
22
-
-
34247393726
-
-
Khurana, H., Hahm, H.-S.: Certified mailing lists. In: ASIACCS 2006, pp. 46-58(2006)
-
Khurana, H., Hahm, H.-S.: Certified mailing lists. In: ASIACCS 2006, pp. 46-58(2006)
-
-
-
-
23
-
-
85001783793
-
Scalable security and accounting services for content- based publish subscribe systems
-
Khurana, H., Koleva, R.: Scalable security and accounting services for content- based publish subscribe systems. International Journal of -Business Research 2(3) (2006)
-
(2006)
International Journal of -Business Research
, vol.2
, Issue.3
-
-
Khurana, H.1
Koleva, R.2
-
24
-
-
33644505148
-
-
ACM SAC
-
Khurana, H., Slagell, A., Bonilla, R.: Sels: A secure e-mail list service. In: ACM SAC 2005, pp. 306-313 (2005)
-
(2005)
Sels: A secure e-mail list service
, pp. 306-313
-
-
Khurana, H.1
Slagell, A.2
Bonilla, R.3
-
25
-
-
40249113119
-
-
Libert, B., Vergnaud, D.: Unidirectional chosen-ciphertext secure proxy reencryption. In: Cramer, R. (ed.) PKC 2008. LNCS, 4939, pp. 360-379. Springer, Heidelberg (2008)
-
Libert, B., Vergnaud, D.: Unidirectional chosen-ciphertext secure proxy reencryption. In: Cramer, R. (ed.) PKC 2008. LNCS, vol. 4939, pp. 360-379. Springer, Heidelberg (2008)
-
-
-
-
26
-
-
35048877778
-
Sequential Aggregate Signatures from Trapdoor Permutations
-
Cachin, C, Camenisch, J.L, eds, EURO-CRYPT 2004, Springer, Heidelberg
-
Lysyanskaya, A., Micali, S., Reyzin, L., Shacham, H.: Sequential Aggregate Signatures from Trapdoor Permutations. In: Cachin, C., Camenisch, J.L. (eds.) EURO-CRYPT 2004. LNCS, vol. 3027, pp. 74-90. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 74-90
-
-
Lysyanskaya, A.1
Micali, S.2
Reyzin, L.3
Shacham, H.4
-
27
-
-
84942550998
-
Public-key cryptosystems based on discrete logarithms residues
-
Stern, J, ed, EUROCRYPT 1999, Springer, Hei delberg
-
Paillier, P.: Public-key cryptosystems based on discrete logarithms residues. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223-238. Springer, Hei delberg (1999)
-
(1999)
LNCS
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
28
-
-
0000537828
-
Efficient identifications and signatures for smart cards
-
Brassard, G, ed, CRYPTO 1989, Springer, Heidelberg
-
Schnorr, C.P.: Efficient identifications and signatures for smart cards. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 239-251. Springer, Heidelberg (1990)
-
(1990)
LNCS
, vol.435
, pp. 239-251
-
-
Schnorr, C.P.1
-
29
-
-
24144479376
-
-
Scott, M.: Computing the tate pairing. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, 3376, pp. 293-304. Springer, Heidelberg (2005)
-
Scott, M.: Computing the tate pairing. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol. 3376, pp. 293-304. Springer, Heidelberg (2005)
-
-
-
-
30
-
-
67049120934
-
-
PhD Thesis, Shanghai Jiao Tong University December
-
Shao, J.: Proxy re-cryptography, revisited, PhD Thesis, Shanghai Jiao Tong University (December, 2007)
-
(2007)
Proxy re-cryptography, revisited
-
-
Shao, J.1
-
31
-
-
67049122562
-
Analysis of cca secure unidirctional id-based pre scheme
-
Shao, J., Xing, D., Cao, Z.: Analysis of cca secure unidirctional id-based pre scheme. Technical Report of TDT (2008)
-
(2008)
Technical Report of TDT
-
-
Shao, J.1
Xing, D.2
Cao, Z.3
-
32
-
-
84948954277
-
Practical threshold signatures
-
Preneel, B, ed, EUROCRYPT 2000, Springer, Heidelberg
-
Shoup, V.: Practical threshold signatures. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 207-220. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1807
, pp. 207-220
-
-
Shoup, V.1
-
33
-
-
84888872516
-
Securing threshold cryptosystems against chosen cipher- text attack
-
Nyberg, K, ed, EUROCRYPT 1998, Springer, Heidelberg
-
Shoup, V., Gennaro, R.: Securing threshold cryptosystems against chosen cipher- text attack. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 1-16. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1403
, pp. 1-16
-
-
Shoup, V.1
Gennaro, R.2
-
35
-
-
33751079898
-
-
Talmy, A., Dobzinski, O.: Abuse freedom in access control schemes. In: AINA 2006, pp. 77-86 (2006)
-
Talmy, A., Dobzinski, O.: Abuse freedom in access control schemes. In: AINA 2006, pp. 77-86 (2006)
-
-
-
|