-
2
-
-
0013175080
-
Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation
-
Advances in Cryptology-EuroCrypt'01. of, Springer Verlag
-
Camenishch, J., Lysyanskaya, A.: Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation. In: Advances in Cryptology-EuroCrypt'01. Volume 2045 of LNCS., Springer Verlag (2002) 93-118
-
(2002)
LNCS
, vol.2045
, pp. 93-118
-
-
Camenishch, J.1
Lysyanskaya, A.2
-
4
-
-
38149125521
-
-
Layouni,M.: Acredited symmetrically private information retrieval. In Miyaji, A., Kikuchi, H., Rannenberg, K., eds.: IWSEC. 4752 of Lecture Notes in Computer Science., Springer (2007) 262-277
-
Layouni,M.: Acredited symmetrically private information retrieval. In Miyaji, A., Kikuchi, H., Rannenberg, K., eds.: IWSEC. Volume 4752 of Lecture Notes in Computer Science., Springer (2007) 262-277
-
-
-
-
5
-
-
57049132121
-
Efficient Multi-Authorizer Accredited Symmetrically Private Information Retrieval
-
Birmingham, UK, UK
-
Mohamed Layouni, Maki Yoshida, Shinago Okamura.: Efficient Multi-Authorizer Accredited Symmetrically Private Information Retrieval. Information and Communications Security(Proceedings of the 10th International ICICS Conference, Birmingham, UK, 2008) (UK) 387-393
-
(2008)
Information and Communications Security(Proceedings of the 10th International ICICS Conference
, pp. 387-393
-
-
Layouni, M.1
Yoshida, M.2
Okamura, S.3
-
6
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
V. Goyal, O. Pandey, A. Sahai, and B. Waters. Attribute-based encryption for fine-grained access control of encrypted data. In Proceedings of the 13th ACM conference on Computer and Communications Security (CCS'06), pages 89-98, 2006.
-
(2006)
Proceedings of the 13th ACM conference on Computer and Communications Security (CCS'06)
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
7
-
-
74249105047
-
-
Dan Boneh, Xavier Boyen, and Eu-Jin Goh. Hierarchical identity based encryption with constant size ciphertext. In EUROCRYPT, pages 440C456, 2005.
-
Dan Boneh, Xavier Boyen, and Eu-Jin Goh. Hierarchical identity based encryption with constant size ciphertext. In EUROCRYPT, pages 440C456, 2005.
-
-
-
-
8
-
-
24944554962
-
Fuzzy Identity Based Encryption
-
Advances in Cryptology, Eurocrypt, of, Springer
-
A. Sahai and B. Waters. Fuzzy Identity Based Encryption. In Advances in Cryptology - Eurocrypt, volume 3494 of LNCS, pages 457-473. Springer, 2005.
-
(2005)
LNCS
, vol.3494
, pp. 457-473
-
-
Sahai, A.1
Waters, B.2
-
9
-
-
34548731375
-
Ciphertext-policy attribute-based encryption
-
IEEE Computer Society
-
Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, IEEE Computer Society (2007)321-334
-
(2007)
IEEE Symposium on Security and Privacy
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
10
-
-
34548731375
-
Ciphertext-policy attribute-based encryption
-
IEEE Computer Society
-
Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, IEEE Computer Society (2007)321-334
-
(2007)
IEEE Symposium on Security and Privacy
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
11
-
-
38049078557
-
-
Chase, M.: Multi-authority attribute based encryption. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, 4392, pp. 515C534. Springer, Heidelberg (2007)
-
Chase, M.: Multi-authority attribute based encryption. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 515C534. Springer, Heidelberg (2007)
-
-
-
-
12
-
-
0003745894
-
-
PhD thesis, Israel Institute of Technology, Technion, Haifa, Israel
-
Amos Beimel. Secure Schemes for Secret Sharing and Key Distribution. PhD thesis, Israel Institute of Technology, Technion, Haifa, Israel, 1996.
-
(1996)
Secure Schemes for Secret Sharing and Key Distribution
-
-
Beimel, A.1
-
13
-
-
23044435711
-
Short signatures from the Weil pairing
-
D Boneh, B Lynn, H Shacham:Short signatures from the Weil pairing. Journal of Cryptology, 2004 Volume 17, Number 4 297-319
-
(2004)
Journal of Cryptology
, vol.17
, Issue.4
, pp. 297-319
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
14
-
-
33751061775
-
A promenade through the new cryptography of bilinear pairings
-
IEEE Press
-
Boyen, X.: A promenade through the new cryptography of bilinear pairings. In: IEEE Information Theory WorkshopłITW 2006, IEEE Press (2006) 19C23
-
(2006)
IEEE Information Theory WorkshopłITW 2006
-
-
Boyen, X.1
|