메뉴 건너뛰기




Volumn 5921 LNCS, Issue , 2009, Pages 278-300

Attribute-based encryption supporting direct/indirect revocation modes

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL MECHANISM; ACCESS POLICIES; CIPHERTEXTS; DIRECT AND INDIRECT METHODS; DIRECT METHOD; ENCRYPTED DATA; INDIRECT METHODS; ON-THE-FLY; PRIVATE KEY; REVOCATION MECHANISM;

EID: 72449201970     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-10868-6_17     Document Type: Conference Paper
Times cited : (180)

References (22)
  • 1
    • 84957678021 scopus 로고    scopus 로고
    • Fast digital identity revocation (extended abstract)
    • Krawczyk, H, ed, CRYPTO 1998, Springer, Heidelberg
    • Aiello, W., Lodha, S., Ostrovsky, R.: Fast digital identity revocation (extended abstract). In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 137-152. Springer, Heidelberg (1998)
    • (1998) LNCS , vol.1462 , pp. 137-152
    • Aiello, W.1    Lodha, S.2    Ostrovsky, R.3
  • 2
    • 68849097854 scopus 로고    scopus 로고
    • Attrapadung, N., Imai, H.: Dual-policy attribute based encryption. In: Abdalla, M., Pointcheval, D., Fouque, P.A., Vergnaud, D. (eds.) ACNS 2009. LNCS, 5536, pp. 168-185. Springer, Heidelberg (2009)
    • Attrapadung, N., Imai, H.: Dual-policy attribute based encryption. In: Abdalla, M., Pointcheval, D., Fouque, P.A., Vergnaud, D. (eds.) ACNS 2009. LNCS, vol. 5536, pp. 168-185. Springer, Heidelberg (2009)
  • 3
    • 69949143544 scopus 로고    scopus 로고
    • Attrapadung, N., Imai, H.: Conjunctive broadcast and attribute-based encryption. In: Boyen, X., Waters, B. (eds.) Pairing 2009. LNCS, 5671, pp. 248-265. Springer, Heidelberg (2009)
    • Attrapadung, N., Imai, H.: Conjunctive broadcast and attribute-based encryption. In: Boyen, X., Waters, B. (eds.) Pairing 2009. LNCS, vol. 5671, pp. 248-265. Springer, Heidelberg (2009)
  • 4
    • 67650112905 scopus 로고    scopus 로고
    • Libert, B., Vergnaud, D.: Adaptive-ID secure revocable identity-based encryption. In: Fischlin, M. (ed.) CT-RSA 2009. LNCS, 5473, pp. 1-15. Springer, Heidelberg (2009)
    • Libert, B., Vergnaud, D.: Adaptive-ID secure revocable identity-based encryption. In: Fischlin, M. (ed.) CT-RSA 2009. LNCS, vol. 5473, pp. 1-15. Springer, Heidelberg (2009)
  • 7
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • Kilian, J, ed, CRYPTO 2001, Springer, Heidelberg
    • Boneh, D., Franklin, M.K.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213-229. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.K.2
  • 8
    • 33745166648 scopus 로고    scopus 로고
    • Collusion resistant broadcast encryption with short ciphertexts and private keys
    • Shoup, V, ed, CRYPTO 2005, Springer, Heidelberg
    • Boneh, D., Gentry, C., Waters, B.: Collusion resistant broadcast encryption with short ciphertexts and private keys. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 258-275. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3621 , pp. 258-275
    • Boneh, D.1    Gentry, C.2    Waters, B.3
  • 9
    • 38049078557 scopus 로고    scopus 로고
    • Chase, M.: Multi-authority attribute based encryption. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, 4392, pp. 515-534. Springer, Heidelberg (2007)
    • Chase, M.: Multi-authority attribute based encryption. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 515-534. Springer, Heidelberg (2007)
  • 10
    • 35248901924 scopus 로고    scopus 로고
    • Dodis, Y., Fazio, N.: Public-key broadcast encryption for stateless receivers. In: Feigenbaum, J. (ed.) DRM 2002. LNCS, 2696, pp. 61-80. Springer, Heidelberg (2003)
    • Dodis, Y., Fazio, N.: Public-key broadcast encryption for stateless receivers. In: Feigenbaum, J. (ed.) DRM 2002. LNCS, vol. 2696, pp. 61-80. Springer, Heidelberg (2003)
  • 11
    • 84979291225 scopus 로고
    • Broadcast encryption
    • Stinson, D.R, ed, CRYPTO 1993, Springer, Heidelberg
    • Fiat, A., Naor, M.: Broadcast encryption. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 480-491. Springer, Heidelberg (1994)
    • (1994) LNCS , vol.773 , pp. 480-491
    • Fiat, A.1    Naor, M.2
  • 12
    • 35248866223 scopus 로고    scopus 로고
    • Certificate-based encryption and the certificate revocation problem
    • Biham, E, ed, EUROCRYPT 2003, Springer, Heidelberg
    • Gentry, C.: Certificate-based encryption and the certificate revocation problem. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 272-293. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2656 , pp. 272-293
    • Gentry, C.1
  • 13
    • 67650659197 scopus 로고    scopus 로고
    • Gentry, C., Waters, B.: Adaptive security in broadcast encryption systems (with short ciphertexts). In: Joux, A. (ed.) Eurocrypt 2009. LNCS, 5479, pp. 171-188. Springer, Heidelberg (2009)
    • Gentry, C., Waters, B.: Adaptive security in broadcast encryption systems (with short ciphertexts). In: Joux, A. (ed.) Eurocrypt 2009. LNCS, vol. 5479, pp. 171-188. Springer, Heidelberg (2009)
  • 15
    • 49049111604 scopus 로고    scopus 로고
    • Bounded ciphertext policy attributebased encryption
    • Aceto, L, Damgård, I, Goldberg, L.A, Halldórsson, M.M, Ingólfsdóttir, A, Walukiewicz, I, eds, ICALP 2008, Part II, Springer, Heidelberg
    • Goyal, V., Jain, A., Pandey, O., Sahai, A.: Bounded ciphertext policy attributebased encryption. In: Aceto, L., Damgård, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) ICALP 2008, Part II. LNCS, vol. 5126, pp. 579-591. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5126 , pp. 579-591
    • Goyal, V.1    Jain, A.2    Pandey, O.3    Sahai, A.4
  • 17
    • 0004179384 scopus 로고    scopus 로고
    • Efficient certificate revocation
    • Tech. Report MIT/LCS/TM-542b
    • Micali, S.: Efficient certificate revocation. Tech. Report MIT/LCS/TM-542b (1996)
    • (1996)
    • Micali, S.1
  • 18
    • 84880852861 scopus 로고    scopus 로고
    • Revocation and tracing schemes for stateless receivers
    • Kilian, J, ed, CRYPTO 2001, Springer, Heidelberg
    • Naor, D., Naor, M., Lotspiech, J.: Revocation and tracing schemes for stateless receivers. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 41-62. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2139 , pp. 41-62
    • Naor, D.1    Naor, M.2    Lotspiech, J.3
  • 20
    • 24944554962 scopus 로고    scopus 로고
    • Fuzzy identity-based encryption
    • Cramer, R, ed, EUROCRYPT 2005, Springer, Heidelberg
    • Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457-473. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3494 , pp. 457-473
    • Sahai, A.1    Waters, B.2
  • 21
    • 69949149993 scopus 로고    scopus 로고
    • Revocation systems with very small private keys. Cryptology ePrint archive
    • report 2008/309
    • Sahai, A., Waters, B.: Revocation systems with very small private keys. Cryptology ePrint archive: report 2008/309
    • Sahai, A.1    Waters, B.2
  • 22
    • 69649091318 scopus 로고    scopus 로고
    • Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization. Cryptology ePrint archive
    • report 2008/290
    • Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. Cryptology ePrint archive: report 2008/290
    • Waters, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.