-
1
-
-
69649105305
-
On multi-authority ciphertext-policy attribute-based encryption
-
July to appear
-
S. Müller, S. Katzenbeisser, and C. Eckert, "On multi-authority ciphertext-policy attribute-based encryption," Bulletin of the Korean Mathematical Society (B-KMS), vol. 46, no. 4, pp. 803-819, July 2009, to appear.
-
(2009)
Bulletin of the Korean Mathematical Society (B-KMS)
, vol.46
, Issue.4
, pp. 803-819
-
-
Müller, S.1
Katzenbeisser, S.2
Eckert, C.3
-
2
-
-
34548731375
-
Ciphertext-policy attribute-based encryption
-
IEEE Computer Society
-
J. Bethencourt, A. Sahai, and B. Waters, "Ciphertext-policy attribute-based encryption," in IEEE Symposium on Security and Privacy. IEEE Computer Society, 2007, pp. 321-334.
-
(2007)
IEEE Symposium on Security and Privacy
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
3
-
-
84979291225
-
Broadcast encryption
-
D.R. Stinson, Ed. Springer
-
A. Fiat and M. Naor, "Broadcast encryption," in CRYPTO, ser. Lecture Notes in Computer Science, D. R. Stinson, Ed., vol. 773. Springer, 1993, pp. 480-491.
-
(1993)
CRYPTO, Ser. Lecture Notes in Computer Science
, vol.773
, pp. 480-491
-
-
Fiat, A.1
Naor, M.2
-
4
-
-
69949143544
-
Conjunctive broadcast and attribute-based encryption
-
H. Shacham and B. Waters, Eds. Springer
-
N. Attrapadung and H. Imai, "Conjunctive broadcast and attribute-based encryption," in Pairing, ser. Lecture Notes in Computer Science, H. Shacham and B. Waters, Eds., vol. 5671. Springer, 2009, pp. 248-265.
-
(2009)
Pairing, Ser. Lecture Notes in Computer Science
, vol.5671
, pp. 248-265
-
-
Attrapadung, N.1
Imai, H.2
-
5
-
-
67049156803
-
Distributed attribute-based encryption
-
P.J. Lee and J.H. Cheon, Eds. Springer
-
S. Müller, S. Katzenbeisser, and C. Eckert, "Distributed attribute-based encryption," in 11th International Conference on Information Security and Cryptography ICISC 2008, ser. Lecture Notes in Computer Science, P. J. Lee and J. H. Cheon, Eds., vol. 5461. Springer, 2008, pp. 20-36.
-
(2008)
11th International Conference on Information Security and Cryptography ICISC 2008, Ser. Lecture Notes in Computer Science
, vol.5461
, pp. 20-36
-
-
Müller, S.1
Katzenbeisser, S.2
Eckert, C.3
-
7
-
-
38049078557
-
Multi-authority attribute based encryption
-
S.P. Vadhan, Ed. Amsterdam, The Netherlands: Springer, February
-
M. Chase, "Multi-authority attribute based encryption," in Theory of Cryptography Conference, TCC 2007, ser. Lecture Notes in Computer Science, S. P. Vadhan, Ed., vol. 4392. Amsterdam, The Netherlands: Springer, February 2007, pp. 515-534.
-
(2007)
Theory of Cryptography Conference, TCC 2007, Ser. Lecture Notes in Computer Science
, vol.4392
, pp. 515-534
-
-
Chase, M.1
-
8
-
-
58749115565
-
Secure threshold multi authority attribute based encryption without a central authority
-
D.R. Chowdhury, V. Rijmen, and A. Das, Eds. Springer
-
H. Lin, Z. Cao, X. Liang, and J. Shao, "Secure threshold multi authority attribute based encryption without a central authority," in 9th International Conference on Cryptology in India, INDOCRYPT 2008, ser. Lecture Notes in Computer Science, D. R. Chowdhury, V. Rijmen, and A. Das, Eds., vol. 5365. Springer, 2008, pp. 426-436.
-
(2008)
9th International Conference on Cryptology in India, INDOCRYPT 2008, Ser. Lecture Notes in Computer Science
, vol.5365
, pp. 426-436
-
-
Lin, H.1
Cao, Z.2
Liang, X.3
Shao, J.4
-
9
-
-
77952383290
-
Attribute-based encryption with partially hidden ciphertext policies
-
T. Nishide, K. Yoneyama, and K. Ohta, "Attribute-based encryption with partially hidden ciphertext policies," IEICE Transactions, vol. 92-A, no. 1, pp. 22-32, 2009.
-
(2009)
IEICE Transactions
, vol.92 A
, Issue.1
, pp. 22-32
-
-
Nishide, T.1
Yoneyama, K.2
Ohta, K.3
-
10
-
-
77952390316
-
-
August [Online]. Available
-
"Open digital rights language," August 2002. [Online]. Available: http://odrl.net
-
(2002)
-
-
-
11
-
-
34548769073
-
Attribute-based publishing with hidden credentials and hidden policies
-
Mar
-
A. Kapadia, P. P. Tsang, and S. W. Smith, "Attribute-based publishing with hidden credentials and hidden policies," in Proceedings of The 14th Annual Network and Distributed System Security Symposium (NDSS), Mar 2007, pp. 179-192.
-
(2007)
Proceedings of the 14th Annual Network and Distributed System Security Symposium (NDSS)
, pp. 179-192
-
-
Kapadia, A.1
Tsang, P.P.2
Smith, S.W.3
-
12
-
-
45749116552
-
Provably secure ciphertext policy ABE
-
P. Ning, S.D.C. di Vimercati, and P.F. Syverson, Eds. ACM
-
L. Cheung and C. C. Newport, "Provably secure ciphertext policy ABE," in ACM Conference on Computer and Communications Security, P. Ning, S. D. C. di Vimercati, and P. F. Syverson, Eds. ACM, 2007, pp. 456-465.
-
(2007)
ACM Conference on Computer and Communications Security
, pp. 456-465
-
-
Cheung, L.1
Newport, C.C.2
-
13
-
-
70350357342
-
Attribute-sets: A practically motivated enhancement to attribute-based encryption
-
M. Backes and P. Ning, Eds. Springer
-
R. Bobba, H. Khurana, and M. Prabhakaran, "Attribute-sets: A practically motivated enhancement to attribute-based encryption," in 14th European Symposium on Research in Computer Security, ESORICS 2009, ser. Lecture Notes in Computer Science, M. Backes and P. Ning, Eds., vol. 5789. Springer, 2009, pp. 587-604.
-
(2009)
14th European Symposium on Research in Computer Security, ESORICS 2009, Ser. Lecture Notes in Computer Science
, vol.5789
, pp. 587-604
-
-
Bobba, R.1
Khurana, H.2
Prabhakaran, M.3
-
14
-
-
49049111604
-
Bounded ciphertext policy attribute based encryption
-
V. Goyal, A. Jain, O. Pandey, and A. Sahai, "Bounded ciphertext policy attribute based encryption," in 35th International Colloquium on Automata, Languages and Programming, ICALP 2008, 2008.
-
(2008)
35th International Colloquium on Automata, Languages and Programming, ICALP 2008
-
-
Goyal, V.1
Jain, A.2
Pandey, O.3
Sahai, A.4
-
15
-
-
77952407083
-
Provably secure and efficient bounded ciphertext policy attribute based encryption
-
W. Li, W. Susilo, U.K. Tupakula, R. Safavi-Naini, and V. Varadharajan, Eds. ACM
-
X. Liang, Z. Cao, H. Lin, and D. Xing, "Provably secure and efficient bounded ciphertext policy attribute based encryption," in 4th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009, W. Li, W. Susilo, U. K. Tupakula, R. Safavi-Naini, and V. Varadharajan, Eds. ACM, 2009, pp. 343-352.
-
(2009)
4th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009
, pp. 343-352
-
-
Liang, X.1
Cao, Z.2
Lin, H.3
Xing, D.4
-
16
-
-
69649091318
-
Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization
-
work in progress. [Online]. Available
-
B. Waters, "Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization," SRI International, Tech. Rep., 2008, work in progress. [Online]. Available: http://eprint.iacr. org/2008/290.pdf
-
(2008)
SRI International, Tech. Rep.
-
-
Waters, B.1
|