메뉴 건너뛰기




Volumn 5671 LNCS, Issue , 2009, Pages 248-265

Conjunctive broadcast and Attribute-based encryption

Author keywords

Attribute based encryption; Broadcast encryption; Ciphertext policy; Disjunctive multi authority ABE; Key policy; Revocable ABE

Indexed keywords

ATTRIBUTE-BASED ENCRYPTION; BROADCAST ENCRYPTION; CIPHERTEXT POLICY; DISJUNCTIVE MULTI-AUTHORITY ABE; KEY POLICY; REVOCABLE ABE;

EID: 69949143544     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-03298-1_16     Document Type: Conference Paper
Times cited : (240)

References (23)
  • 1
    • 84957678021 scopus 로고    scopus 로고
    • Fast digital identity revocation (extended abstract)
    • Krawczyk, H, ed, CRYPTO 1998, Springer, Heidelberg
    • Aiello, W., Lodha, S., Ostrovsky, R.: Fast digital identity revocation (extended abstract). In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 137-152. Springer, Heidelberg (1998)
    • (1998) LNCS , vol.1462 , pp. 137-152
    • Aiello, W.1    Lodha, S.2    Ostrovsky, R.3
  • 2
    • 33646817761 scopus 로고    scopus 로고
    • Graph-decomposition-based frameworks for subsetcover broadcast encryption and efficient instantiations
    • Roy, B, ed, ASI-ACRYPT 2005, Springer, Heidelberg
    • Attrapadung, N., Imai, H.: Graph-decomposition-based frameworks for subsetcover broadcast encryption and efficient instantiations. In: Roy, B. (ed.) ASI-ACRYPT 2005. LNCS, vol. 3788, pp. 100-120. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3788 , pp. 100-120
    • Attrapadung, N.1    Imai, H.2
  • 3
    • 68849097854 scopus 로고    scopus 로고
    • Attrapadung, N., Imai, H.: Dual-policy attribute based encryption. In: Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.) ACNS 2009. LNCS, 5536, pp. 168-185. Springer, Heidelberg (2009)
    • Attrapadung, N., Imai, H.: Dual-policy attribute based encryption. In: Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.) ACNS 2009. LNCS, vol. 5536, pp. 168-185. Springer, Heidelberg (2009)
  • 4
    • 37849032181 scopus 로고    scopus 로고
    • Forward-secure and searchable broadcast encryption with short ciphertexts and private keys
    • Lai, X, Chen, K, eds, ASIACRYPT 2006, Springer, Heidelberg
    • Attrapadung, N., Furukawa, J., Imai, H.: Forward-secure and searchable broadcast encryption with short ciphertexts and private keys. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol. 4284, pp. 161-177. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4284 , pp. 161-177
    • Attrapadung, N.1    Furukawa, J.2    Imai, H.3
  • 7
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • Kilian, J, ed, CRYPTO 2001, Springer, Heidelberg
    • Boneh, D., Franklin, M.K.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213-229. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.K.2
  • 8
    • 33745166648 scopus 로고    scopus 로고
    • Collusion resistant broadcast encryption with short ciphertexts and private keys
    • Shoup, V, ed, CRYPTO 2005, Springer, Heidelberg
    • Boneh, D., Gentry, C., Waters, B.: Collusion resistant broadcast encryption with short ciphertexts and private keys. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 258-275. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3621 , pp. 258-275
    • Boneh, D.1    Gentry, C.2    Waters, B.3
  • 9
    • 58349086247 scopus 로고    scopus 로고
    • Generalized identity based and broadcast encryption schemes
    • Pieprzyk, J, ed, ASIACRYPT 2008, Springer, Heidelberg
    • Boneh, D., Hamburg, M.: Generalized identity based and broadcast encryption schemes. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 455-470. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5350 , pp. 455-470
    • Boneh, D.1    Hamburg, M.2
  • 10
    • 38049078557 scopus 로고    scopus 로고
    • Chase, M.: Multi-authority attribute based encryption. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, 4392, pp. 515-534. Springer, Heidelberg (2007)
    • Chase, M.: Multi-authority attribute based encryption. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 515-534. Springer, Heidelberg (2007)
  • 11
    • 35248901924 scopus 로고    scopus 로고
    • Dodis, Y., Fazio, N.: Public-key broadcast encryption for stateless receivers. In: Feigenbaum, J. (ed.) DRM 2002. LNCS, 2696, pp. 61-80. Springer, Heidelberg (2002)
    • Dodis, Y., Fazio, N.: Public-key broadcast encryption for stateless receivers. In: Feigenbaum, J. (ed.) DRM 2002. LNCS, vol. 2696, pp. 61-80. Springer, Heidelberg (2002)
  • 12
    • 84979291225 scopus 로고
    • Broadcast encryption
    • Stinson, D.R, ed, CRYPTO 1993, Springer, Heidelberg
    • Fiat, A., Naor, M.: Broadcast encryption. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 480-491. Springer, Heidelberg (1993)
    • (1993) LNCS , vol.773 , pp. 480-491
    • Fiat, A.1    Naor, M.2
  • 13
    • 35248866223 scopus 로고    scopus 로고
    • Certificate-based encryption and the certificate revocation problem
    • Biham, E, ed, EUROCRYPT 2003, Springer, Heidelberg
    • Gentry, C.: Certificate-based encryption and the certificate revocation problem. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 272-293. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2656 , pp. 272-293
    • Gentry, C.1
  • 15
    • 49049111604 scopus 로고    scopus 로고
    • Bounded ciphertext policy attributebased encryption
    • Aceto, L, Damgård, I, Goldberg, L.A, Halldórsson, M.M, Ingólfsdóttir, A, Walukiewicz, I, eds, ICALP 2008, Part II, Springer, Heidelberg
    • Goyal, V., Jain, A., Pandey, O., Sahai, A.: Bounded ciphertext policy attributebased encryption. In: Aceto, L., Damgård, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) ICALP 2008, Part II. LNCS, vol. 5126, pp. 579-591. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5126 , pp. 579-591
    • Goyal, V.1    Jain, A.2    Pandey, O.3    Sahai, A.4
  • 17
    • 0004179384 scopus 로고    scopus 로고
    • Efficient certificate revocation
    • Tech. Report MIT/LCS/TM-542b
    • Micali, S.: Efficient certificate revocation. Tech. Report MIT/LCS/TM-542b (1996)
    • (1996)
    • Micali, S.1
  • 18
    • 84880852861 scopus 로고    scopus 로고
    • Revocation and tracing schemes for stateless receivers
    • Kilian, J, ed, CRYPTO 2001, Springer, Heidelberg
    • Naor, D., Naor, M., Lotspiech, J.: Revocation and tracing schemes for stateless receivers. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 41-62. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2139 , pp. 41-62
    • Naor, D.1    Naor, M.2    Lotspiech, J.3
  • 19
    • 84944319284 scopus 로고    scopus 로고
    • Naor, M., Pinkas, B.: Efficient trace and revoke schemes. In: Frankel, Y. (ed.) FC 2000. LNCS, 1962, pp. 1-20. Springer, Heidelberg (2001)
    • Naor, M., Pinkas, B.: Efficient trace and revoke schemes. In: Frankel, Y. (ed.) FC 2000. LNCS, vol. 1962, pp. 1-20. Springer, Heidelberg (2001)
  • 21
    • 24944554962 scopus 로고    scopus 로고
    • Fuzzy identity-based encryption
    • Cramer, R, ed, EUROCRYPT 2005, Springer, Heidelberg
    • Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457-473. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3494 , pp. 457-473
    • Sahai, A.1    Waters, B.2
  • 23
    • 69649091318 scopus 로고    scopus 로고
    • Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization
    • Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. Cryptology ePrint archive: report 2008/290 (2008)
    • (2008) Cryptology ePrint archive: Report 2008 , vol.290
    • Waters, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.