-
1
-
-
0018545449
-
How to share a secret
-
Shamir, A.: How to share a secret. Commun. ACM 22, 612-613 (1979)
-
(1979)
Commun. ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
2
-
-
85062838317
-
Safeguarding cryptographic keys
-
American Federation of Information, Processing Societies Proceedings
-
Blakley, G.R.: Safeguarding cryptographic keys. In: Proceedings of the National Computer Conference, American Federation of Information, Processing Societies Proceedings, vol.48, pp. 313-317 (1979)
-
(1979)
Proceedings of the National Computer Conference
, vol.48
, pp. 313-317
-
-
Blakley, G.R.1
-
3
-
-
38149050474
-
CCA2-secure threshold broadcast encryption with shorter ciphertexts
-
Proceedings of ProvSec'07, Springer
-
Daza, V., Herranz, J., Morillo, P., Ràfols, C.: CCA2-secure threshold broadcast encryption with shorter ciphertexts. In: Proceedings of ProvSec'07, LNCS, vol.4784, pp. 35-50. Springer (2007)
-
(2007)
LNCS
, vol.4784
, pp. 35-50
-
-
Daza, V.1
Herranz, J.2
Morillo, P.3
Ràfols, C.4
-
4
-
-
69649091318
-
Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization
-
available at
-
Waters B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. Manuscript available at http://eprint.iacr.org/2008/290 (2008)
-
(2008)
Manuscript
-
-
Waters, B.1
-
5
-
-
0000354685
-
Some ideal secret sharing schemes
-
Brickell, E.F.: Some ideal secret sharing schemes. J. Comb. Math. Comb. Comput. 9, 105-113 (1989)
-
(1989)
J. Comb. Math. Comb. Comput.
, vol.9
, pp. 105-113
-
-
Brickell, E.F.1
-
6
-
-
38049036249
-
On secret sharing schemes, matroids and polymatroids
-
Proceedings of TCC'07, Springer
-
Martí-Farré, J., Padró, C.: On secret sharing schemes, matroids and polymatroids. In: Proceedings of TCC'07, LNCS, vol.4392, pp. 273-290. Springer (2007)
-
(2007)
LNCS
, vol.4392
, pp. 273-290
-
-
Martí-Farré, J.1
Padró, C.2
-
7
-
-
84898132112
-
How to (really) share a secret
-
Proceedings of Crypto'88, Springer
-
Simmons, G.J.: How to (really) share a secret. In: Proceedings of Crypto'88, LNCS, vol.403, pp. 390-448. Springer (1990)
-
(1990)
LNCS
, vol.403
, pp. 390-448
-
-
Simmons, G.J.1
-
8
-
-
33947522725
-
Hierarchical threshold secret sharing
-
Tassa, T.: Hierarchical threshold secret sharing. J. Cryptol. 20(2), 237-264 (2007)
-
(2007)
J. Cryptol.
, vol.20
, Issue.2
, pp. 237-264
-
-
Tassa, T.1
-
9
-
-
64249091460
-
Multipartite secret sharing by bivariate interpolation
-
Tassa, T., Dyn, N.: Multipartite secret sharing by bivariate interpolation. J. Cryptol. 22(2), 227-258 (2009)
-
(2009)
J. Cryptol.
, vol.22
, Issue.2
, pp. 227-258
-
-
Tassa, T.1
Dyn, N.2
-
10
-
-
0034315039
-
Secret sharing schemes with bipartite access structure
-
Padró, C., Sáez, G.: Secret sharing schemes with bipartite access structure. IEEE Trans. Inf. Theory 46(7), 2596-2604 (2000)
-
(2000)
IEEE Trans. Inf. Theory
, vol.46
, Issue.7
, pp. 2596-2604
-
-
Padró, C.1
Sáez, G.2
-
11
-
-
61849155741
-
Characterizing ideal weighted threshold secret sharing
-
Beimel, A., Tassa, T., Weinreb, E.: Characterizing ideal weighted threshold secret sharing. SIAM J. Discrete Math. 22(1), 360-397 (2008)
-
(2008)
SIAM J. Discrete Math.
, vol.22
, Issue.1
, pp. 360-397
-
-
Beimel, A.1
Tassa, T.2
Weinreb, E.3
-
12
-
-
84957712291
-
An efficient threshold public key cryptosystem secure against adaptive chosen ciphertext attack
-
Proceedings of Eurocrypt'99, Springer
-
Canetti, R., Goldwasser, S.: An efficient threshold public key cryptosystem secure against adaptive chosen ciphertext attack. In: Proceedings of Eurocrypt'99, LNCS, vol.1592, pp. 90-106. Springer (1999)
-
(1999)
LNCS
, vol.1592
, pp. 90-106
-
-
Canetti, R.1
Goldwasser, S.2
-
13
-
-
33745655389
-
Chosen ciphertext secure public key threshold encryption without random oracles
-
Proceedings of CT-RSA'06, Springer
-
Boneh, D., Boyen, X., Halevi, S.: Chosen ciphertext secure public key threshold encryption without random oracles. In: Proceedings of CT-RSA'06, LNCS, vol.3860, pp. 226-243. Springer (2006)
-
(2006)
LNCS
, vol.3860
, pp. 226-243
-
-
Boneh, D.1
Boyen, X.2
Halevi, S.3
-
14
-
-
38149069864
-
Dynamic threshold cryptosystems: A new scheme in group oriented cryptography
-
CTU Publishing house
-
Ghodosi, H., Pieprzyk, J., Safavi-Naini, R.: Dynamic threshold cryptosystems: a new scheme in group oriented cryptography. In: Proceedings of Pragocrypt'96, CTU Publishing house, pp. 370-379 (1996)
-
(1996)
Proceedings of Pragocrypt'96
, pp. 370-379
-
-
Ghodosi, H.1
Pieprzyk, J.2
Safavi-Naini, R.3
-
15
-
-
84979073196
-
Directed signatures and application to threshold cryptosystems
-
Proceedings of Security Protocols Workshop'96, Springer
-
Lim, C.H., Lee, P.J.: Directed signatures and application to threshold cryptosystems. In: Proceedings of Security Protocols Workshop'96, LNCS, vol.1189, pp. 131-138. Springer (1997)
-
(1997)
LNCS
, vol.1189
, pp. 131-138
-
-
Lim, C.H.1
Lee, P.J.2
-
16
-
-
33845571027
-
Efficient ID-based broadcast threshold decryption in ad hoc network
-
IEEE Computer Society
-
Chai, Z., Cao, Z., Zhou, Y.: Efficient ID-based broadcast threshold decryption in ad hoc network. In: Proceedings of IMSCCS'06, vol.2, IEEE Computer Society, pp. 148-154 (2006)
-
(2006)
Proceedings of IMSCCS'06
, vol.2
, pp. 148-154
-
-
Chai, Z.1
Cao, Z.2
Zhou, Y.3
-
17
-
-
51849088550
-
Dynamic threshold public-key encryption
-
Proceedings of Crypto'08, Springer
-
Delerablée, C., Pointcheval, D.: Dynamic threshold public-key encryption. In: Proceedings of Crypto'08, LNCS, vol.5157, pp. 317-334. Springer (2008)
-
(2008)
LNCS
, vol.5157
, pp. 317-334
-
-
Delerablée, C.1
Pointcheval, D.2
-
18
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 31, 469-472 (1985)
-
(1985)
IEEE Trans. Inf. Theory
, vol.31
, pp. 469-472
-
-
ElGamal, T.1
-
19
-
-
35048841300
-
Efficient selective-ID secure identity-based encryption without random oracles
-
Proceedings of Eurocrypt'04, Springer
-
Boneh, D., Boyen, X.: Efficient selective-ID secure identity-based encryption without random oracles. In: Proceedings of Eurocrypt'04, LNCS, vol.3027, pp. 223-238. Springer (2004)
-
(2004)
LNCS
, vol.3027
, pp. 223-238
-
-
Boneh, D.1
Boyen, X.2
-
20
-
-
35048852705
-
Chosen-ciphertext security from identity-based encryption
-
Proceedings of Eurocrypt'04, Springer
-
Canetti, R., Halevi, S., Katz, J.: Chosen-ciphertext security from identity-based encryption. In: Proceedings of Eurocrypt'04, LNCS, vol.3027, pp. 207-222. Springer (2004)
-
(2004)
LNCS
, vol.3027
, pp. 207-222
-
-
Canetti, R.1
Halevi, S.2
Katz, J.3
-
21
-
-
24944554962
-
Fuzzy identity-based encryption
-
Proceedings of Eurocrypt'05, Springer
-
Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Proceedings of Eurocrypt'05, LNCS, vol.3494, pp. 457-473. Springer (2005)
-
(2005)
LNCS
, vol.3494
, pp. 457-473
-
-
Sahai, A.1
Waters, B.2
-
22
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
Goyal, V., Pandey, O., Sahai, A.,Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of Computer and Communications Security, CCS'06, ACM, pp. 89-98 (2006)
-
(2006)
Proceedings of Computer and Communications Security, CCS'06, ACM
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
23
-
-
34548731375
-
Ciphertext-policy attribute-based encryption
-
IEEE Society Press
-
Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 321-334. IEEE Society Press (2007)
-
(2007)
Proceedings of IEEE Symposium on Security and Privacy
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
24
-
-
0027726717
-
Random oracles are practical: A paradigm for designing efficient protocols
-
Bellare, M., Rogaway, P.: Random oracles are practical: a paradigm for designing efficient protocols. In: Proceedings of Computer and Communications Security, CCS'93, ACM, pp. 62-73 (1993)
-
(1993)
Proceedings of Computer and Communications Security, CCS'93, ACM
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
25
-
-
0037623983
-
Identity-based encryption from the Weil pairing
-
Boneh, D., Franklin, M.K.: Identity-based encryption from the Weil pairing. SIAM J. Comput. 32(3), 586-615 (2003)
-
(2003)
SIAM J. Comput.
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.K.2
-
26
-
-
24944562007
-
Hierarchical identity based encryption with constant size ciphertext
-
Proceedings of Eurocrypt'05, Springer
-
Boneh, D., Boyen, X., Goh, E.-J.: Hierarchical identity based encryption with constant size ciphertext. In: Proceedings of Eurocrypt'05, LNCS, vol.3494, pp. 440-456. Springer (2005)
-
(2005)
LNCS
, vol.3494
, pp. 440-456
-
-
Boneh, D.1
Boyen, X.2
Goh, E.-J.3
-
27
-
-
33745166648
-
Collusion resistant broadcast encryption with short ciphertexts and private keys
-
Advances in Cryptology - CRYPTO 2005 - 25th Annual International Cryptology Conference, Proceedings
-
Boneh, D., Gentry, C.,Waters, B.: Collusion resistant broadcast encryption with short ciphertexts and private keys. In: Proceedings of Crypto'05, LNCS, vol.3621, pp. 258-275. Springer (2005) (Pubitemid 43902118)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3621
, pp. 258-275
-
-
Boneh, D.1
Gentry, C.2
Waters, B.3
|