-
1
-
-
43449138479
-
Searchable encryption revisited: Consistency properties, relation to anonymous ibe, and extensions
-
Michel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange, John Malone-Lee, Gregory Neven, Pascal Paillier, and Haixia Shi. Searchable encryption revisited: Consistency properties, relation to anonymous ibe, and extensions. J. Cryptology, 21(3):350-391, 2008.
-
(2008)
J. Cryptology
, vol.21
, Issue.3
, pp. 350-391
-
-
Abdalla, M.1
Bellare, M.2
Catalano, D.3
Kiltz, E.4
Kohno, T.5
Lange, T.6
Malone-Lee, J.7
Neven, G.8
Paillier, P.9
Shi, H.10
-
2
-
-
84976752387
-
Cryptographic solution to a problem of access control in a hierarchy
-
Selim G. Akl and Peter D. Taylor. Cryptographic solution to a problem of access control in a hierarchy. ACM Trans. Comput. Syst., 1(3):239-248, 1983.
-
(1983)
ACM Trans. Comput. Syst
, vol.1
, Issue.3
, pp. 239-248
-
-
Akl, S.G.1
Taylor, P.D.2
-
3
-
-
60349128962
-
Dynamic and efficient key management for access hierarchies
-
Mikhail J. Atallah, Marina Blanton, Nelly Fazio, and Keith B. Frikken. Dynamic and efficient key management for access hierarchies. ACM Trans. Inf. Syst. Secur., 12(3):1-43, 2009.
-
(2009)
ACM Trans. Inf. Syst. Secur
, vol.12
, Issue.3
, pp. 1-43
-
-
Atallah, M.J.1
Blanton, M.2
Fazio, N.3
Frikken, K.B.4
-
4
-
-
74049149007
-
Benaloh. Key compression and its application to digital fingerprinting
-
Microsoft Research
-
Josh Benaloh. Key compression and its application to digital fingerprinting. Technical Report Technical Report, Microsoft Research, 2009.
-
(2009)
Technical Report Technical Report
-
-
Josh1
-
6
-
-
35048901123
-
Public key encryption with keyword search
-
Dan Boneh, Giovanni Di Crescenzo, Rafail Ostrovsky, and Giuseppe Persiano. Public key encryption with keyword search. In EUROCRYPT, pages 506-522, 2004.
-
(2004)
EUROCRYPT
, pp. 506-522
-
-
Boneh, D.1
Di Crescenzo, G.2
Ostrovsky, R.3
Persiano, G.4
-
7
-
-
35048852705
-
Chosen-ciphertext security from identity-based encryption
-
Ran Canetti, Shai Halevi, and Jonathan Katz. Chosen-ciphertext security from identity-based encryption. In EUROCRYPT, pages 207-222, 2004.
-
(2004)
EUROCRYPT
, pp. 207-222
-
-
Canetti, R.1
Halevi, S.2
Katz, J.3
-
8
-
-
34547240272
-
Searchable symmetric encryption: Improved denitions and efficient constructions
-
Reza Curtmola, Juan A. Garay, Seny Kamara, and Rafail Ostrovsky. Searchable symmetric encryption: improved denitions and efficient constructions. In ACM Conference on Computer and Communications Security, pages 79-88, 2006.
-
(2006)
ACM Conference on Computer and Communications Security
, pp. 79-88
-
-
Curtmola, R.1
Garay, J.A.2
Kamara, S.3
Ostrovsky, R.4
-
9
-
-
85011043313
-
Over-encryption: Management of access control evolution on outsourced data
-
VLDB Endowment
-
Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, and Pierangela Samarati. Over-encryption: management of access control evolution on outsourced data. In VLDB '07: Proceedings of the 33rd international conference on Very large data bases, pages 123-134. VLDB Endowment, 2007.
-
(2007)
VLDB '07: Proceedings of the 33rd international conference on Very large data bases
, pp. 123-134
-
-
Capitani di Vimercati, S.D.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
11
-
-
70349557354
-
Hierarchical ID-based cryptography
-
Yuliang Zheng, editor, Advances in Cryptology, ASIACRYPT 2002, of, Springer Verlag
-
Craig Gentry and Alice Silverberg. Hierarchical ID-based cryptography. In Yuliang Zheng, editor, Advances in Cryptology - ASIACRYPT 2002, volume 2501 of Lecture Notes in Computer Science, pages 548-566. Springer Verlag, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2501
, pp. 548-566
-
-
Gentry, C.1
Silverberg, A.2
-
12
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
Vipul Goyal, Omkant Pandey, Amit Sahai, and Brent Waters. Attribute-based encryption for fine-grained access control of encrypted data. In ACM Conference on Computer and Communications Security, pages 89-98, 2006.
-
(2006)
ACM Conference on Computer and Communications Security
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
13
-
-
33745470377
-
Exploiting hierarchical identity-based encryption for access control to pervasive computing information
-
Washington, DC, USA, IEEE Computer Society
-
Urs Hengartner and Peter Steenkiste. Exploiting hierarchical identity-based encryption for access control to pervasive computing information. In SECURECOMM '05: Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, pages 384-396, Washington, DC, USA, 2005. IEEE Computer Society.
-
(2005)
SECURECOMM '05: Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
, pp. 384-396
-
-
Hengartner, U.1
Steenkiste, P.2
-
15
-
-
24944554962
-
Fuzzy identity-based encryption
-
Amit Sahai and Brent Waters. Fuzzy identity-based encryption. In EUROCRYPT, pages 457-473, 2005.
-
(2005)
EUROCRYPT
, pp. 457-473
-
-
Sahai, A.1
Waters, B.2
-
16
-
-
0023962708
-
Cryptographic implementation of a tree hierarchy for access control
-
Ravi S. Sandhu. Cryptographic implementation of a tree hierarchy for access control. Inf. Process. Lett., 27(2):95-98, 1988.
-
(1988)
Inf. Process. Lett
, vol.27
, Issue.2
, pp. 95-98
-
-
Sandhu, R.S.1
-
17
-
-
38049015677
-
On the generation of cryptographically strong pseudorandom sequences
-
Adi Shamir. On the generation of cryptographically strong pseudorandom sequences. In ACM Transaction on Computer Systems, volume 1, pages 38-44, 1983.
-
(1983)
ACM Transaction on Computer Systems
, vol.1
, pp. 38-44
-
-
Shamir, A.1
-
18
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
George Robert Blakley and David Chaum, editors, Advances in Cryptology, CRYPTO '84, of, Springer Verlag
-
Adi Shamir. Identity-based cryptosystems and signature schemes. In George Robert Blakley and David Chaum, editors, Advances in Cryptology - CRYPTO '84, volume 196 of Lecture Notes in Computer Science, pages 47-53. Springer Verlag, 1985.
-
(1985)
Lecture Notes in Computer Science
, vol.196
, pp. 47-53
-
-
Shamir, A.1
|