-
1
-
-
0003745894
-
-
PhD Thesis, Israel Institute of Technology, Technion, Haifa, Israel
-
Beimel, A.: Secure schemes for secret sharing and key distribution. PhD Thesis, Israel Institute of Technology, Technion, Haifa, Israel (1996)
-
(1996)
Secure Schemes for Secret Sharing and Key Distribution
-
-
Beimel, A.1
-
2
-
-
34548731375
-
Ciphertext-policy attribute-based encryption
-
IEEE Press, Los Alamitos
-
Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: 2007 IEEE Symposium on Security and Privacy, pp. 321-334. IEEE Press, Los Alamitos (2007)
-
(2007)
2007 IEEE Symposium on Security and Privacy
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
3
-
-
35048841300
-
Efficient selective-ID secure identity based encryption without random oracles
-
Cachin, C., Camenisch, J.L. (eds.) LNCS Springer, Heidelberg
-
Boneh, D., Boyen, X.: Efficient selective-ID secure identity based encryption without random oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 223-238. Springer, Heidelberg (2004)
-
(2004)
EUROCRYPT 2004
, vol.3027
, pp. 223-238
-
-
Boneh, D.1
Boyen, X.2
-
4
-
-
35048835319
-
Secure identity based encryption without random oracles
-
Franklin, M.K. (ed.) LNCS Springer, Heidelberg
-
Boneh, D., Boyen, X.: Secure identity based encryption without random oracles. In: Franklin, M.K. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 443-459. Springer, Heidelberg (2004)
-
(2004)
CRYPTO 2004
, vol.3152
, pp. 443-459
-
-
Boneh, D.1
Boyen, X.2
-
5
-
-
24944562007
-
Hierarchical identity based encryption with constant size ciphertext
-
Cramer, R. (ed.) LNCS Springer, Heidelberg
-
Boneh, D., Boyen, X., Goh, E.: Hierarchical identity based encryption with constant size ciphertext. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 440-456. Springer, Heidelberg (2005)
-
(2005)
EUROCRYPT 2005
, vol.3494
, pp. 440-456
-
-
Boneh, D.1
Boyen, X.2
Goh, E.3
-
6
-
-
84874324906
-
Identity-based encryption from the weil pairing
-
Kilian, J. (ed.) LNCS Springer, Heidelberg
-
Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213-229. Springer, Heidelberg (2001)
-
(2001)
CRYPTO 2001
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
7
-
-
58349086247
-
Generalized identity based and broadcast encryption scheme
-
Pieprzyk, J. (ed.) LNCS Springer, Heidelberg
-
Boneh, D., Hamburg, M.: Generalized identity based and broadcast encryption scheme. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 455-470. Springer, Heidelberg (2008)
-
(2008)
ASIACRYPT 2008
, vol.5350
, pp. 455-470
-
-
Boneh, D.1
Hamburg, M.2
-
8
-
-
24144453101
-
Improved efficiency for CCA-secure cryptosystems built using identity based encryption
-
Menezes, A. (ed.) LNCS Springer, Heidelberg
-
Boneh, D., Katz, J.: Improved efficiency for CCA-secure cryptosystems built using identity based encryption. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol. 3376, pp. 87-103. Springer, Heidelberg (2005)
-
(2005)
CT-RSA 2005
, vol.3376
, pp. 87-103
-
-
Boneh, D.1
Katz, J.2
-
9
-
-
38049045519
-
Conjunctive, subset, and range queries on encrypted data
-
Vadhan, S.P. (ed.) LNCS Springer, Heidelberg
-
Boneh, D., Waters, B.: Conjunctive, subset, and range queries on encrypted data. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 535-554. Springer, Heidelberg (2007)
-
(2007)
TCC 2007
, vol.4392
, pp. 535-554
-
-
Boneh, D.1
Waters, B.2
-
10
-
-
33749573228
-
Anonymous hierarchical identity-based encryption (Without random oracles)
-
Advances in Cryptology - CRYPTO 2006 - 26th Annual International Cryptology Conference, Proceedings LNCS
-
Boyen, X., Waters, B.: Anonymous hierarchical identity-based encryption (without random oracles). In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 290-307. Springer, Heidelberg (2006) (Pubitemid 44532122)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4117
, pp. 290-307
-
-
Boyen, X.1
Waters, B.2
-
11
-
-
35048852705
-
Chosen-ciphertext security from identity-based encryption
-
Cachin, C., Camenisch, J.L. (eds.) LNCS Springer, Heidelberg
-
Canetti, R., Halevi, S., Katz, J.: Chosen-ciphertext security from identity-based encryption. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 207-222. Springer, Heidelberg (2004)
-
(2004)
EUROCRYPT 2004
, vol.3027
, pp. 207-222
-
-
Canetti, R.1
Halevi, S.2
Katz, J.3
-
12
-
-
77950151506
-
An identity based encryption scheme based on quadratic residues
-
Honary, B. (ed.) LNCS Springer, Heidelberg
-
Cocks, C.: An identity based encryption scheme based on quadratic residues. In: Honary, B. (ed.) Cryptography and Coding 2001. LNCS, vol. 2260, pp. 360-363. Springer, Heidelberg (2001)
-
(2001)
Cryptography and Coding 2001
, vol.2260
, pp. 360-363
-
-
Cocks, C.1
-
13
-
-
33746062799
-
Practical identity-based encryption without random oracles
-
Vaudenay, S. (ed.) LNCS Springer, Heidelberg
-
Gentry, C.: Practical identity-based encryption without random oracles. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 445-464. Springer, Heidelberg (2006)
-
(2006)
EUROCRYPT 2006
, vol.4004
, pp. 445-464
-
-
Gentry, C.1
-
14
-
-
70350663051
-
Hierarchical identity-based encryption with polynomially many levels
-
Reingold, O. (ed.) LNCS Springer, Heidelberg
-
Gentry, C., Halevi, S.: Hierarchical identity-based encryption with polynomially many levels. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 437-456. Springer, Heidelberg (2009)
-
(2009)
TCC 2009
, vol.5444
, pp. 437-456
-
-
Gentry, C.1
Halevi, S.2
-
15
-
-
70349557354
-
Hierarchical ID-based cryptography
-
Zheng, Y. (ed.) LNCS Springer, Heidelberg
-
Gentry, C., Silverberg, A.: Hierarchical ID-based cryptography. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 548-566. Springer, Heidelberg (2002)
-
(2002)
ASIACRYPT 2002
, vol.2501
, pp. 548-566
-
-
Gentry, C.1
Silverberg, A.2
-
16
-
-
34547273527
-
Attribute-based encryption for finegrained access control of encrypted data
-
ACM, New York
-
Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for finegrained access control of encrypted data. In: ACM Conference on Computer and Communication Security 2006, pp. 89-98. ACM, New York (2006)
-
(2006)
ACM Conference on Computer and Communication Security 2006
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
17
-
-
44449129423
-
Predicate encryption supporting disjunctions, polynomial equations, and inner products
-
Smart, N.P. (ed.) LNCS Springer, Heidelberg
-
Katz, J., Sahai, A., Waters, B.: Predicate encryption supporting disjunctions, polynomial equations, and inner products. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 146-162. Springer, Heidelberg (2008)
-
(2008)
EUROCRYPT 2008
, vol.4965
, pp. 146-162
-
-
Katz, J.1
Sahai, A.2
Waters, B.3
-
18
-
-
77954635558
-
Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption
-
Gilbert, H. (ed.) LNCS Springer, Heidelberg
-
Lewko, A., Okamoto, T., Sahai, A., Takashima, K., Waters, B.: Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 62-91. Springer, Heidelberg (2010)
-
(2010)
EUROCRYPT 2010
, vol.6110
, pp. 62-91
-
-
Lewko, A.1
Okamoto, T.2
Sahai, A.3
Takashima, K.4
Waters, B.5
-
19
-
-
77949581448
-
New techniques for dual system encryption and fully secure HIBE with short ciphertexts
-
Micciancio, D. (ed.) LNCS Springer, Heidelberg
-
Lewko, A.B., Waters, B.: New techniques for dual system encryption and fully secure HIBE with short ciphertexts. In: Micciancio, D. (ed.) TCC 2010. LNCS, vol. 5978, pp. 455-479. Springer, Heidelberg (2010)
-
(2010)
TCC 2010
, vol.5978
, pp. 455-479
-
-
Lewko, A.B.1
Waters, B.2
-
20
-
-
52149087229
-
Homomorphic encryption and signatures from vector decomposition
-
Galbraith, S.D., Paterson, K.G. (eds.) LNCS Springer, Heidelberg
-
Okamoto, T., Takashima, K.: Homomorphic encryption and signatures from vector decomposition. In: Galbraith, S.D., Paterson, K.G. (eds.) Pairing 2008. LNCS, vol. 5209, pp. 57-74. Springer, Heidelberg (2008)
-
(2008)
Pairing 2008
, vol.5209
, pp. 57-74
-
-
Okamoto, T.1
Takashima, K.2
-
21
-
-
72449208663
-
Hierarchical predicate encryption for inner-products
-
Matsui, M. (ed.) LNCS Springer, Heidelberg
-
Okamoto, T., Takashima, K.: Hierarchical predicate encryption for inner-products. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 114-231. Springer, Heidelberg (2009)
-
(2009)
ASIACRYPT 2009
, vol.5912
, pp. 114-231
-
-
Okamoto, T.1
Takashima, K.2
-
22
-
-
74049120601
-
Attribute-based encryption with nonmonotonic access structures
-
ACM, New York
-
Ostrovsky, R., Sahai, A., Waters, B.: Attribute-based encryption with nonmonotonic access structures. In: ACM Conference on Computer and Communication Security 2007, pp. 195-203. ACM, New York (2007)
-
(2007)
ACM Conference on Computer and Communication Security 2007
, pp. 195-203
-
-
Ostrovsky, R.1
Sahai, A.2
Waters, B.3
-
23
-
-
34547325357
-
Secure attribute-based systems
-
ACM, New York
-
Pirretti, M., Traynor, P., McDaniel, P., Waters, B.: Secure attribute-based systems. In: ACM Conference on Computer and Communication Security 2006, pp. 99-112. ACM, New York (2006)
-
(2006)
ACM Conference on Computer and Communication Security 2006
, pp. 99-112
-
-
Pirretti, M.1
Traynor, P.2
McDaniel, P.3
Waters, B.4
-
24
-
-
24944554962
-
Fuzzy identity-based encryption
-
Cramer, R. (ed.) LNCS Springer, Heidelberg
-
Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EU-ROCRYPT 2005. LNCS, vol. 3494, pp. 457-473. Springer, Heidelberg (2005)
-
(2005)
EU-ROCRYPT 2005
, vol.3494
, pp. 457-473
-
-
Sahai, A.1
Waters, B.2
-
25
-
-
49049104392
-
Delegating capability in predicate encryption systems
-
Aceto, L., Damgård, I., Goldberg, L.A., Halldørsson, M.M., Ingølfsdøttir, A., Walukiewicz, I. (eds.) LNCS Springer, Heidelberg
-
Shi, E., Waters, B.: Delegating capability in predicate encryption systems. In: Aceto, L., Damgård, I., Goldberg, L.A., Halldørsson, M.M., Ingølfsdøttir, A., Walukiewicz, I. (eds.) ICALP 2008, Part II. LNCS, vol. 5126, pp. 560-578. Springer, Heidelberg (2008)
-
(2008)
ICALP 2008
, vol.5126
, Issue.PART II
, pp. 560-578
-
-
Shi, E.1
Waters, B.2
-
26
-
-
24944566040
-
Efficient identity based encryption without random oracles
-
Cramer, R. (ed.) LNCS Springer, Heidelberg
-
Waters, B.: Efficient identity based encryption without random oracles. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 114-127. Springer, Heidelberg (2005)
-
(2005)
EUROCRYPT 2005
, vol.3494
, pp. 114-127
-
-
Waters, B.1
-
28
-
-
70350345210
-
Dual system encryption: Realizing fully secure IBE and HIBE under simple assumptions
-
Halevi, S. (ed.) LNCS Springer, Heidelberg
-
Waters, B.: Dual system encryption: realizing fully secure IBE and HIBE under simple assumptions. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 619-636. Springer, Heidelberg (2009)
-
(2009)
CRYPTO 2009
, vol.5677
, pp. 619-636
-
-
Waters, B.1
|