메뉴 건너뛰기




Volumn E92-A, Issue 1, 2009, Pages 22-32

Attribute-based encryption with partially hidden ciphertext policies

Author keywords

Access control on encrypted data; Attribute based encryption; Recipient anonymity

Indexed keywords

ACCESS CONTROL; SECURITY OF DATA;

EID: 77952383290     PISSN: 09168508     EISSN: 17451337     Source Type: Journal    
DOI: 10.1587/transfun.E92.A.22     Document Type: Conference Paper
Times cited : (15)

References (23)
  • 3
    • 24944562007 scopus 로고    scopus 로고
    • Hierarchical identity based encryption with constant size ciphertext
    • LNCS 3494, Springer
    • D. Boneh, X. Boyen, and E.-J. Goh, "Hierarchical identity based encryption with constant size ciphertext," Proc. Eurocrypt 2005, LNCS 3494, pp.440-456, Springer, 2005.
    • (2005) Proc. Eurocrypt 2005 , pp. 440-456
    • Boneh, D.1    Boyen, X.2    Goh, E.-J.3
  • 4
    • 35048887476 scopus 로고    scopus 로고
    • Short group signatures
    • LNCS 3152, Springer
    • D. Boneh, X. Boyen, and H. Shacham, "Short group signatures," Proc. Crypto 2004, LNCS 3152, pp.41-55, Springer, 2004.
    • (2004) Proc. Crypto 2004 , pp. 41-55
    • Boneh, D.1    Boyen, X.2    Shacham, H.3
  • 5
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing
    • LNCS 2139, Springer
    • D. Boneh and M. Franklin, "Identity-based encryption from the Weil pairing," Proc. Crypto 2001, LNCS 2139, pp.213-229, Springer, 2001.
    • (2001) Proc. Crypto 2001 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 6
    • 38049045519 scopus 로고    scopus 로고
    • Conjunctive, subset, and range queries on encrypted data
    • LNCS 4392, Springer
    • D. Boneh and B. Waters, "Conjunctive, subset, and range queries on encrypted data," Proc. Theory of Cryptography Conference (TCC), LNCS 4392, pp.535-554, Springer, 2007.
    • (2007) Proc. Theory of Cryptography Conference (TCC) , pp. 535-554
    • Boneh, D.1    Waters, B.2
  • 9
    • 35248897599 scopus 로고    scopus 로고
    • A forward-secure public-key encryption scheme
    • LNCS 2656, Springer
    • R. Canetti, S. Halevi, and J. Katz, "A forward-secure public-key encryption scheme," Proc. Eurocrypt 2003, LNCS 2656, pp.255-271, Springer, 2003.
    • (2003) Proc. Eurocrypt 2003 , pp. 255-271
    • Canetti, R.1    Halevi, S.2    Katz, J.3
  • 10
    • 35048852705 scopus 로고    scopus 로고
    • Chosen-ciphertext security from identity-based encryption
    • LNCS 3027, Springer
    • R. Canetti, S. Halevi, and J. Katz, "Chosen-ciphertext security from identity-based encryption," Proc. Eurocrypt 2004, LNCS 3027, pp.207-222, Springer, 2004.
    • (2004) Proc. Eurocrypt 2004 , pp. 207-222
    • Canetti, R.1    Halevi, S.2    Katz, J.3
  • 11
    • 38049078557 scopus 로고    scopus 로고
    • Multi-authority attribute based encryption
    • LNCS 4392, Springer
    • M. Chase, "Multi-authority attribute based encryption," Proc. Theory of Cryptography Conference (TCC), LNCS 4392, pp.515-534, Springer, 2007.
    • (2007) Proc. Theory of Cryptography Conference (TCC) , pp. 515-534
    • Chase, M.1
  • 14
    • 0009733453 scopus 로고    scopus 로고
    • A one round protocol for tripartite Diffie-Hellman
    • A. Joux, "A one round protocol for tripartite Diffie-Hellman," Proc. ANTS-IV, pp.385-394, 2000.
    • (2000) Proc. ANTS-IV , pp. 385-394
    • Joux, A.1
  • 16
    • 44449129423 scopus 로고    scopus 로고
    • Predicate encryption supporting disjunctions, polynomial equations, and inner products
    • LNCS 4965, Springer
    • J. Katz, A. Sahai, and B. Waters, "Predicate encryption supporting disjunctions, polynomial equations, and inner products," Proc. Eurocrypt 2008, LNCS 4965, pp.146-162, Springer, 2008.
    • (2008) Proc. Eurocrypt 2008 , pp. 146-162
    • Katz, J.1    Sahai, A.2    Waters, B.3
  • 17
    • 0035336179 scopus 로고    scopus 로고
    • New explicit conditions of elliptic curve traces for FR-reductions
    • May
    • A. Miyaji, M. Nakabayashi, and S. Takano, "New explicit conditions of elliptic curve traces for FR-reductions," IEICE Trans. Fundamentals, vol.E84-A, no.5, pp.1234-1243, May 2001.
    • (2001) IEICE Trans. Fundamentals , vol.E84-A , Issue.5 , pp. 1234-1243
    • Miyaji, A.1    Nakabayashi, M.2    Takano, S.3
  • 19
    • 45749094622 scopus 로고    scopus 로고
    • Attribute-based encryption with partially hidden encryptor-specified access structures
    • LNCS 5037, Springer
    • T. Nishide, K. Yoneyama, and K. Ohta, "Attribute-based encryption with partially hidden encryptor-specified access structures," Proc. Applied Cryptography and Network Security (ACNS), LNCS 5037, pp.111-129, Springer, 2008.
    • (2008) Proc. Applied Cryptography and Network Security (ACNS) , pp. 111-129
    • Nishide, T.1    Yoneyama, K.2    Ohta, K.3
  • 21
    • 24944554962 scopus 로고    scopus 로고
    • Fuzzy identity-based encryption
    • LNCS 3494, Springer
    • A. Sahai and B. Waters, "Fuzzy identity-based encryption," Proc. Eurocrypt 2005, LNCS 3494, pp.457-473, Springer, 2005.
    • (2005) Proc. Eurocrypt 2005 , pp. 457-473
    • Sahai, A.1    Waters, B.2
  • 22
    • 33646718113 scopus 로고    scopus 로고
    • Authenticated ID-based key exchange and remote login with simple token and PIN number
    • M. Scott, "Authenticated ID-based key exchange and remote login with simple token and PIN number," Cryptology ePrint Archive 2002/164, 2002.
    • (2002) Cryptology EPrint Archive 2002/164
    • Scott, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.