-
1
-
-
85180411878
-
Improved proxy re-encryption schemes with applications to secure distributed storage
-
Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. In: Proc. of the 12th Annual Network and Distributed System Security Symposium, pp. 29-44 (2005)
-
(2005)
Proc. of the 12th Annual Network and Distributed System Security Symposium
, pp. 29-44
-
-
Ateniese, G.1
Fu, K.2
Green, M.3
Hohenberger, S.4
-
2
-
-
54249101916
-
Public key encryption with keyword search revisited
-
Gervasi, O., Murgante, B., Laganà, A., Taniar, D., Mun, Y., Gavrilova, M.L. (eds.) ICCSA 2008, Part I. Springer, Heidelberg
-
Baek, J., Safavi-Naini, R., Susilo, W.: Public key encryption with keyword search revisited. In: Gervasi, O., Murgante, B., Laganà, A., Taniar, D., Mun, Y., Gavrilova, M.L. (eds.) ICCSA 2008, Part I. LNCS, vol. 5072, pp. 1249-1259. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5072
, pp. 1249-1259
-
-
Baek, J.1
Safavi-Naini, R.2
Susilo, W.3
-
3
-
-
84957718934
-
Divertible protocols and atomic proxy cryptography
-
Nyberg, K. (ed.) EUROCRYPT 1998. Springer, Heidelberg
-
Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127-144. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1403
, pp. 127-144
-
-
Blaze, M.1
Bleumer, G.2
Strauss, M.3
-
4
-
-
35048841300
-
Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles
-
Advances in Cryptology - EUROCRYPT 2004
-
Boneh, D., Boyen, X.: Efficient selective-ID based encryption without random oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 223-238. Springer, Heidelberg (2004) (Pubitemid 38717007)
-
(2004)
LECTURE NOTES in COMPUTER SCIENCE
, Issue.3027
, pp. 223-238
-
-
Boneh, D.1
Boyen, X.2
-
5
-
-
35048901123
-
Public Key Encryption with Keyword Search
-
Advances in Cryptology - EUROCRYPT 2004
-
Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506-522. Springer, Heidelberg (2004) (Pubitemid 38717023)
-
(2004)
LECTURE NOTES in COMPUTER SCIENCE
, Issue.3027
, pp. 506-522
-
-
Boneh, D.1
Di Crescenzo, G.2
Ostrovsky, R.3
Persiano, G.4
-
6
-
-
84874324906
-
Identity-based encryption from the weil pairing
-
Kilian, J. (ed.) CRYPTO 2001. Springer, Heidelberg
-
Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 229-231. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2139
, pp. 229-231
-
-
Boneh, D.1
Franklin, M.2
-
7
-
-
0031619016
-
The random oracle methodology, revisited
-
ACM Press, New York
-
Canetti, R., Goldreich, O., Halevi, S.: The random oracle methodology, revisited. In: Proc. of 30th ACM STOC, pp. 209-218. ACM Press, New York (1998)
-
(1998)
Proc. of 30th ACM STOC
, pp. 209-218
-
-
Canetti, R.1
Goldreich, O.2
Halevi, S.3
-
8
-
-
35048852705
-
Chosen-Ciphertext Security from Identity-Based Encryption
-
Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. Springer, Heidelberg
-
Canetti, R., Halevi, S., Katz, J.: Chosen-Ciphertext Security from Identity-Based Encryption. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 207-222. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 207-222
-
-
Canetti, R.1
Halevi, S.2
Katz, J.3
-
10
-
-
35248875326
-
Relaxing chosen-ciphertext security
-
Boneh, D. (ed.) CRYPTO 2003. Springer, Heidelberg
-
Canetti, R., Krawczyk, H., Nielsen, J.B.: Relaxing chosen-ciphertext security. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 565-582. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2729
, pp. 565-582
-
-
Canetti, R.1
Krawczyk, H.2
Nielsen, J.B.3
-
11
-
-
38149038713
-
Identity-based proxy re-encryption without random oracles
-
Garay, J.A., Lenstra, A.K., Mambo, M., Peralta, R. (eds.) ISC 2007. Springer, Heidelberg
-
Chu, C., Tzeng, W.: Identity-based proxy re-encryption without random oracles. In: Garay, J.A., Lenstra, A.K., Mambo, M., Peralta, R. (eds.) ISC 2007. LNCS, vol. 4779, pp. 189-202. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4779
, pp. 189-202
-
-
Chu, C.1
Tzeng, W.2
-
12
-
-
58449122500
-
Chosen-cipertext secure proxy re-encryption without pairings
-
Franklin, M.K., Hui, L.C.K., Wong, D.S. (eds.) CANS 2008. Springer, Heidelberg
-
Deng, R.H., Weng, J., Liu, S., Chen, K.: Chosen-cipertext secure proxy re-encryption without pairings. In: Franklin, M.K., Hui, L.C.K., Wong, D.S. (eds.) CANS 2008. LNCS, vol. 5339, pp. 1-17. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5339
, pp. 1-17
-
-
Deng, R.H.1
Weng, J.2
Liu, S.3
Chen, K.4
-
13
-
-
24144481228
-
A verifiable random function with short proofs and keys
-
Vaudenay, S. (ed.) PKC 2005. Springer, Heidelberg
-
Dodis, Y., Yampolskiy, A.: A verifiable random function with short proofs and keys. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol. 3386, pp. 416-431. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3386
, pp. 416-431
-
-
Dodis, Y.1
Yampolskiy, A.2
-
14
-
-
33746062799
-
Practical identity-based encryption without random oracles
-
Vaudenay, S. (ed.) EUROCRYPT 2006. Springer, Heidelberg
-
Gentry, C.: Practical identity-based encryption without random oracles. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 445-464. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4004
, pp. 445-464
-
-
Gentry, C.1
-
15
-
-
38049061546
-
Identity-based proxy re-encryption
-
Katz, J., Yung, M. (eds.) ACNS 2007. Springer, Heidelberg
-
Green, M., Ateniese, G.: Identity-based proxy re-encryption. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 288-306. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4521
, pp. 288-306
-
-
Green, M.1
Ateniese, G.2
-
16
-
-
43149089620
-
CCA2 secure IBE: Standard model efficiency through authenticated symmetric encryption
-
Malkin, T.G. (ed.) CT-RSA 2008. Springer, Heidelberg
-
Kiltz, E., Vahlis, Y.: CCA2 secure IBE: standard model efficiency through authenticated symmetric encryption. In: Malkin, T.G. (ed.) CT-RSA 2008. LNCS, vol. 4964, pp. 221-238. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4964
, pp. 221-238
-
-
Kiltz, E.1
Vahlis, Y.2
-
17
-
-
40249113119
-
Unidirectional chosen-ciphertext secure proxy re-encryption
-
Cramer, R. (ed.) PKC 2008. Springer, Heidelberg
-
Libert, B., Vergnaud, D.: Unidirectional chosen-ciphertext secure proxy re-encryption. In: Cramer, R. (ed.) PKC 2008. LNCS, vol. 4939, pp. 360-379. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4939
, pp. 360-379
-
-
Libert, B.1
Vergnaud, D.2
-
18
-
-
64949106593
-
Secure searchable public key encryption scheme against keyword guessing attacks
-
Rhee, H.S., Susilo, W., Kim, H.-J.: Secure searchable public key encryption scheme against keyword guessing attacks. IEICE Electron. Express 6(5), 237-243 (2009)
-
(2009)
IEICE Electron. Express
, vol.6
, Issue.5
, pp. 237-243
-
-
Rhee, H.S.1
Susilo, W.2
Kim, H.-J.3
-
19
-
-
67049100266
-
CCA-secure proxy re-encryption without pairings
-
Proc. of PKC 2009. Springer, Heidelberg
-
Shao, J., Cao, Z.: CCA-secure proxy re-encryption without pairings. In: Proc. of PKC 2009. LNCS, vol. 5443, pp. 357-376. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5443
, pp. 357-376
-
-
Shao, J.1
Cao, Z.2
-
20
-
-
67049122562
-
Analysis of CCA secure unidirectional ID-based PRE scheme
-
Shanghai Jiao Tong University
-
Shao, J., Xing, D., Cao, Z.: Analysis of CCA secure unidirectional ID-based PRE scheme. Technical Report of TDT, Shanghai Jiao Tong University (2008)
-
(2008)
Technical Report of TDT
-
-
Shao, J.1
Xing, D.2
Cao, Z.3
-
21
-
-
77952320634
-
Conditional proxy re-encryption secure against chosen-ciphertext attack
-
Weng, J., Deng, R.H., Chu, C., Ding, X., Lai, J.: Conditional proxy re-encryption secure against chosen-ciphertext attack. In: Proc. of the 4th International Symposium on ACM Symposium on Information, Computer and Communications Security (ASIACCS 2009), pp. 322-332 (2009)
-
(2009)
Proc. of the 4th International Symposium on ACM Symposium on Information, Computer and Communications Security (ASIACCS 2009)
, pp. 322-332
-
-
Weng, J.1
Deng, R.H.2
Chu, C.3
Ding, X.4
Lai, J.5
|