-
1
-
-
34548731375
-
Ciphertext-policy attribute-based encryption
-
J. Bethencourt, A. Sahai, B. Waters, Ciphertext-policy attribute-based encryption, in: IEEE Symposium on Security and Privacy, 2007, pp. 321-334.
-
(2007)
IEEE Symposium on Security and Privacy
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
2
-
-
55949088433
-
A secure identity-based proxy multi-signature scheme
-
Cao F., and Cao Z. A secure identity-based proxy multi-signature scheme. Inform. Sci. 179 3 (2009) 292-302
-
(2009)
Inform. Sci.
, vol.179
, Issue.3
, pp. 292-302
-
-
Cao, F.1
Cao, Z.2
-
5
-
-
0031375570
-
-
FOCS
-
Y. Frankel, P. Gemmell, P.D. MacKenzie, M. Yung, Optimal resilience proactive public-key cryptosystems, in: FOCS, 1997, pp. 384-393.
-
(1997)
Optimal resilience proactive public-key cryptosystems
, pp. 384-393
-
-
Frankel, Y.1
Gemmell, P.2
MacKenzie, P.D.3
Yung, M.4
-
6
-
-
84947926543
-
-
R. Gennaro, S. Jarecki, H. Krawczyk, T. Rabin, Robust threshold dss signatures, in: EUROCRYPT, 1996, pp. 354-371.
-
R. Gennaro, S. Jarecki, H. Krawczyk, T. Rabin, Robust threshold dss signatures, in: EUROCRYPT, 1996, pp. 354-371.
-
-
-
-
7
-
-
0035835293
-
Robust threshold dss signatures
-
Gennaro R., Jarecki S., Krawczyk H., and Rabin T. Robust threshold dss signatures. Inform. Comput. 164 1 (2001) 54-84
-
(2001)
Inform. Comput.
, vol.164
, Issue.1
, pp. 54-84
-
-
Gennaro, R.1
Jarecki, S.2
Krawczyk, H.3
Rabin, T.4
-
8
-
-
33846862213
-
Secure distributed key generation for discrete-log based cryptosystems
-
Gennaro R., Jarecki S., Krawczyk H., and Rabin T. Secure distributed key generation for discrete-log based cryptosystems. J. Cryptol. 20 1 (2007) 51-83
-
(2007)
J. Cryptol.
, vol.20
, Issue.1
, pp. 51-83
-
-
Gennaro, R.1
Jarecki, S.2
Krawczyk, H.3
Rabin, T.4
-
9
-
-
49049111604
-
-
V. Goyal, A.J. 0002, O. Pandey, A. Sahai, Bounded ciphertext policy attribute based encryption, in: ICALP, 2, 2008, pp. 579-591.
-
V. Goyal, A.J. 0002, O. Pandey, A. Sahai, Bounded ciphertext policy attribute based encryption, in: ICALP, vol. 2, 2008, pp. 579-591.
-
-
-
-
10
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
V. Goyal, O. Pandey, A. Sahai, B. Waters, Attribute-based encryption for fine-grained access control of encrypted data, in: ACM Conference on Computer and Communications Security, 2006, pp. 89-98.
-
(2006)
ACM Conference on Computer and Communications Security
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
11
-
-
0030646698
-
Proactive public key and signature systems
-
A. Herzberg, M. Jakobsson, S. Jarecki, H. Krawczyk, M. Yung, Proactive public key and signature systems, in: ACM Conference on Computer and Communications Security, 1997, pp. 100-110.
-
(1997)
ACM Conference on Computer and Communications Security
, pp. 100-110
-
-
Herzberg, A.1
Jakobsson, M.2
Jarecki, S.3
Krawczyk, H.4
Yung, M.5
-
12
-
-
84957626176
-
-
A. Herzberg, S. Jarecki, H. Krawczyk, M. Yung, Proactive secret sharing or: how to cope with perpetual leakage, in: CRYPTO, 1995, pp. 339-352.
-
A. Herzberg, S. Jarecki, H. Krawczyk, M. Yung, Proactive secret sharing or: how to cope with perpetual leakage, in: CRYPTO, 1995, pp. 339-352.
-
-
-
-
13
-
-
70349739567
-
A forward-secure e-mail protocol without certificated public keys
-
Kwon J.O., Jeong I.R., and Lee D.H. A forward-secure e-mail protocol without certificated public keys. Inform. Sci. 179 24 (2009) 4227-4231
-
(2009)
Inform. Sci.
, vol.179
, Issue.24
, pp. 4227-4231
-
-
Kwon, J.O.1
Jeong, I.R.2
Lee, D.H.3
-
14
-
-
0027580298
-
Efficient and secure multiparty generation of digital signatures based on discrete logarithms
-
M. Cerecedo, T. Matsumoto, H. Imai, Efficient and secure multiparty generation of digital signatures based on discrete logarithms, in: IEICE Transactions on Fundamentals, 1993, pp. 532-545.
-
(1993)
IEICE Transactions on Fundamentals
, pp. 532-545
-
-
Cerecedo, M.1
Matsumoto, T.2
Imai, H.3
-
15
-
-
33845941453
-
Security weakness in a three-party pairing-based protocol for password authenticated key exchange
-
Nam J., Lee Y., Kim S., and Won D. Security weakness in a three-party pairing-based protocol for password authenticated key exchange. Inform. Sci. 177 6 (2007) 1364-1375
-
(2007)
Inform. Sci.
, vol.177
, Issue.6
, pp. 1364-1375
-
-
Nam, J.1
Lee, Y.2
Kim, S.3
Won, D.4
-
16
-
-
74049120601
-
Attribute-based encryption with non-monotonic access structures
-
R. Ostrovsky, A. Sahai, B. Waters, Attribute-based encryption with non-monotonic access structures, in: ACM Conference on Computer and Communications Security, 2007, pp. 195-203.
-
(2007)
ACM Conference on Computer and Communications Security
, pp. 195-203
-
-
Ostrovsky, R.1
Sahai, A.2
Waters, B.3
-
17
-
-
34547325357
-
Secure attribute-based systems
-
M. Pirretti, P. Traynor, P. McDaniel, B. Waters. Secure attribute-based systems, in: ACM Conference on Computer and Communications Security, 2006, pp. 99-112.
-
(2006)
ACM Conference on Computer and Communications Security
, pp. 99-112
-
-
Pirretti, M.1
Traynor, P.2
McDaniel, P.3
Waters, B.4
-
18
-
-
84957689308
-
-
T. Rabin, A simplified approach to threshold and proactive rsa, in: CRYPTO, 1998, pp. 89-104.
-
T. Rabin, A simplified approach to threshold and proactive rsa, in: CRYPTO, 1998, pp. 89-104.
-
-
-
-
19
-
-
24944554962
-
-
A. Sahai, B. Waters, Fuzzy identity-based encryption, in: EUROCRYPT, 2005, pp. 457-473.
-
A. Sahai, B. Waters, Fuzzy identity-based encryption, in: EUROCRYPT, 2005, pp. 457-473.
-
-
-
-
20
-
-
85020598353
-
-
A. Shamir, Identity-based cryptosystems and signature schemes, in: CRYPTO, 1984, pp. 47-53.
-
A. Shamir, Identity-based cryptosystems and signature schemes, in: CRYPTO, 1984, pp. 47-53.
-
-
-
-
21
-
-
55949109421
-
An improved identity-based key agreement protocol and its security proof
-
Wang S., Cao Z., Choo K.-K.R., and Wang L. An improved identity-based key agreement protocol and its security proof. Inform. Sci. 179 3 (2009) 307-318
-
(2009)
Inform. Sci.
, vol.179
, Issue.3
, pp. 307-318
-
-
Wang, S.1
Cao, Z.2
Choo, K.-K.R.3
Wang, L.4
-
22
-
-
35948963685
-
A novel id-based designated verifier signature scheme
-
Zhang J., and Mao J. A novel id-based designated verifier signature scheme. Inform. Sci. 178 3 (2008) 766-773
-
(2008)
Inform. Sci.
, vol.178
, Issue.3
, pp. 766-773
-
-
Zhang, J.1
Mao, J.2
|