-
2
-
-
0037623983
-
Identity-based encryption from the weil pairing
-
D. Boneh and M.K. Franklin, "Identity-based encryption from the weil pairing," SIAM J. Comput., vol. 32, no. 3, pp. 586-615, 2003.
-
(2003)
SIAM J. Comput.
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.K.2
-
3
-
-
70349557354
-
Hierarchical ID-based cryptography
-
C. Gentry and A. Silverberg, "Hierarchical ID-based cryptography," in Advances in Cryptology- ASIACRYPT 2002, Lecture Notes in Computer Science, vol. 2501, pp. 548-566, 2002.
-
(2002)
Advances in Cryptology- ASIACRYPT 2002, Lecture Notes in Computer Science
, vol.2501
, pp. 548-566
-
-
Gentry, C.1
Silverberg, A.2
-
5
-
-
24944562007
-
Hierarchical identity based encryption with constant size ciphertext
-
D. Boneh, X. Boyen, and E. Goh, "Hierarchical identity based encryption with constant size ciphertext," in Advances in Cryptology - EUROCRYPT 2005. Lecture Notes in Computer Science, vol. 3493, pp. 440-456, 2005.
-
(2005)
Advances in Cryptology - EUROCRYPT 2005. Lecture Notes in Computer Science
, vol.3493
, pp. 440-456
-
-
Boneh, D.1
Boyen, X.2
Goh, E.3
-
7
-
-
33746062799
-
Practical identity-based encryption without random oracles
-
C. Gentry, "Practical identity-based encryption without random oracles," in Advances in Cryptology - EUROCRYPT 2006, Lecture Notes in Computer Science, vol. 4004, pp. 445-464, 2006.
-
(2006)
Advances in Cryptology - EUROCRYPT 2006, Lecture Notes in Computer Science
, vol.4004
, pp. 445-464
-
-
Gentry, C.1
-
8
-
-
70350663051
-
Hierarchical identity based encryption with polynomially many levels
-
C. Gentry and S. Halevi, "Hierarchical identity based encryption with polynomially many levels," in TCC 2009, Lecture Notes in Computer Science, vol. 5444, pp. 437-456, 2009.
-
(2009)
TCC 2009, Lecture Notes in Computer Science
, vol.5444
, pp. 437-456
-
-
Gentry, C.1
Halevi, S.2
-
9
-
-
70350345210
-
Dual system encryption: Realizing fully secure IBE and HIBE under simple assumptions
-
B. Waters, "Dual system encryption: realizing fully secure IBE and HIBE under simple assumptions," in Advances in Cryptology - CRYPTO 2009. Lecture Notes in Computer Science, vol. 5677, pp. 619-636, 2009.
-
(2009)
Advances in Cryptology - CRYPTO 2009. Lecture Notes in Computer Science
, vol.5677
, pp. 619-636
-
-
Waters, B.1
-
10
-
-
77949581448
-
New techniques for dual system encryption and fully secure HIBE with short ciphertexts
-
A. Lewko and B. Waters, "New techniques for dual system encryption and fully secure HIBE with short ciphertexts," in TCC 2010, Lecture Notes in Computer Science, vol. 5978, pp. 455-479, 2010.
-
(2010)
TCC 2010, Lecture Notes in Computer Science
, vol.5978
, pp. 455-479
-
-
Lewko, A.1
Waters, B.2
-
11
-
-
33745134401
-
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
-
M. Abdalla, M. Bellare, D. Catalano, E. Kiltz, T. Kohno, T. Lange, J. Malone-Lee, G. Neven, P. Paillier, and H. Shi, "Searchable encryption revisited: consistency properties, relation to anonymous IBE, and extensions," in Advances in Cryptology - CRYPTO 2005. Lecture Notes in Computer Science, vol. 3621, pp. 205-222, 2005.
-
(2005)
Advances in Cryptology - CRYPTO 2005. Lecture Notes in Computer Science
, vol.3621
, pp. 205-222
-
-
Abdalla, M.1
Bellare, M.2
Catalano, D.3
Kiltz, E.4
Kohno, T.5
Lange, T.6
Malone-Lee, J.7
Neven, G.8
Paillier, P.9
Shi, H.10
-
13
-
-
49049104392
-
Delegating capabilities in predicate encryption systems
-
E. Shi and B. Waters, "Delegating capabilities in predicate encryption systems," in ICALP 2008. Lecture Notes in Computer Science, vol. 5126, pp. 560-578, 2008.
-
(2008)
ICALP 2008. Lecture Notes in Computer Science
, vol.5126
, pp. 560-578
-
-
Shi, E.1
Waters, B.2
-
14
-
-
67049108616
-
Anonymous hierarchical identity-based encryption with constant size ciphertexts
-
J.H. Seo, T. Kobayashi, M. Ohkubo, and K. Suzuki, "Anonymous hierarchical identity-based encryption with constant size ciphertexts," in PKC 2009. Lecture Notes in Computer Science, vol. 5443, pp. 215-234, 2009.
-
(2009)
PKC 2009. Lecture Notes in Computer Science
, vol.5443
, pp. 215-234
-
-
Seo, J.H.1
Kobayashi, T.2
Ohkubo, M.3
Suzuki, K.4
-
16
-
-
77952048540
-
Anonymity from asymmetry: New constructions for anonymous HIBE
-
L. Ducas, "Anonymity from asymmetry: New constructions for anonymous HIBE," in CT-RSA 2010, Lecture Notes in Computer Science, vol. 5985, pp. 148-164, 2010.
-
(2010)
CT-RSA 2010, Lecture Notes in Computer Science
, vol.5985
, pp. 148-164
-
-
Ducas, L.1
-
17
-
-
77955872093
-
On anonymity in an electronic society: A survey of anonymous communication systems
-
article 5
-
M. Edman and B. Yener, "On anonymity in an electronic society: A survey of anonymous communication systems," ACM Computing Surveys, vol. 42, no. 1, article 5, 2009.
-
(2009)
ACM Computing Surveys
, vol.42
, Issue.1
-
-
Edman, M.1
Yener, B.2
-
18
-
-
84946837370
-
Key-privacy in public-key encryption
-
M. Bellare, A. Boldyreva, A. Desai, and D. Pointcheval, "Key-privacy in public-key encryption," in Advances in Cryptology - ASIACRYPT 2001. Lecture Notes in Computer Science, vol. 2248, pp. 566-582, 2001.
-
(2001)
Advances in Cryptology - ASIACRYPT 2001. Lecture Notes in Computer Science
, vol.2248
, pp. 566-582
-
-
Bellare, M.1
Boldyreva, A.2
Desai, A.3
Pointcheval, D.4
-
19
-
-
35048901123
-
Public-key encryption with keyword search
-
D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano, "Public-key encryption with keyword search," in Advances in Cryptology - EUROCRYPT 2004. Lecture Notes in Computer Science, vol. 3027, pp. 506-522, 2004.
-
(2004)
Advances in Cryptology - EUROCRYPT 2004. Lecture Notes in Computer Science
, vol.3027
, pp. 506-522
-
-
Boneh, D.1
Di Crescenzo, G.2
Ostrovsky, R.3
Persiano, G.4
-
20
-
-
34548774576
-
Multi-dimensional range query over encrypted data
-
in
-
E. Shi, J. Bethencourt, T.H. Chan, D. Song, and A. Perrig, "Multi-dimensional range query over encrypted data," in IEEE Symposium on Security and Privacy 2007, pp. 350-364, 2007.
-
(2007)
IEEE Symposium on Security and Privacy 2007
, pp. 350-364
-
-
Shi, E.1
Bethencourt, J.2
Chan, T.H.3
Song, D.4
Perrig, A.5
-
21
-
-
77954639466
-
Converting pairing-based cryptosystems from composite-order groups to prime-order groups
-
D.M. Freeman, "Converting pairing-based cryptosystems from composite-order groups to prime-order groups," in Advances in Cryptology - EUROCRYPT 2010, Lecture Notes in Computer Science, vol. 6110, pp. 44-61, 2010.
-
(2010)
Advances in Cryptology - EUROCRYPT 2010, Lecture Notes in Computer Science
, vol.6110
, pp. 44-61
-
-
Freeman, D.M.1
-
22
-
-
34547273527
-
Attribute based encryption for fine-graned access control of encrypted data
-
in
-
V. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attribute based encryption for fine-graned access control of encrypted data," in ACM Conference on Computer and Communications Security 2006, pp. 89-98, 2006.
-
(2006)
ACM Conference on Computer and Communications Security 2006
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
23
-
-
84946840347
-
Short signatures from the weil pairing
-
D. Boneh, B. Lynn, and H. Shacham, "Short signatures from the weil pairing," in Advances in Cryptology - Asiacrypt 2001. Lecture Notes in Computer Science, vol. 2248, pp. 514-532, 2001.
-
(2001)
Advances in Cryptology - Asiacrypt 2001. Lecture Notes in Computer Science
, vol.2248
, pp. 514-532
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
25
-
-
35048852705
-
Chosen-ciphertext security from identity-based encryption
-
R. Canetti, S. Halevi, and J. Katz, "Chosen-ciphertext security from identity-based encryption," in Advances in Cryptology - EUROCRYPT 2004. Lecture Notes in Computer Science, vol. 3027, pp. 207-222, 2004.
-
(2004)
Advances in Cryptology - EUROCRYPT 2004. Lecture Notes in Computer Science
, vol.3027
, pp. 207-222
-
-
Canetti, R.1
Halevi, S.2
Katz, J.3
-
26
-
-
38049123546
-
General ad hoc encryption from exponent inversion IBE
-
X. Boyen, "General ad hoc encryption from exponent inversion IBE," in Advances in Cryptology - EUROCRYPT 2007, Lecture Notes in Computer Science, vol. 4515, pp. 394-411, 2007.
-
(2007)
Advances in Cryptology - EUROCRYPT 2007, Lecture Notes in Computer Science
, vol.4515
, pp. 394-411
-
-
Boyen, X.1
-
28
-
-
38049045519
-
Conjunctive, subset, and range queries on encrypted data
-
D. Boneh and B. Waters, "Conjunctive, subset, and range queries on encrypted data," in TCC 2007. Lecture Notes in Computer Science, vol. 4392, pp. 535-554, 2007.
-
(2007)
TCC 2007. Lecture Notes in Computer Science
, vol.4392
, pp. 535-554
-
-
Boneh, D.1
Waters, B.2
-
29
-
-
44449129423
-
Predicate encryption supporting disjunctions, polynomial equations, and inner products
-
J. Katz, A. Sahai, and B. Waters, "Predicate encryption supporting disjunctions, polynomial equations, and inner products," in Advances in Cryptology - EUROCRYPT 2008. Lecture Notes in Computer Science, vol. 4965, pp. 146-162, 2008.
-
(2008)
Advances in Cryptology - EUROCRYPT 2008. Lecture Notes in Computer Science
, vol.4965
, pp. 146-162
-
-
Katz, J.1
Sahai, A.2
Waters, B.3
-
30
-
-
35248897599
-
A forward-secure public-key encryption scheme
-
R. Canetti, S. Halevi, and J. Katz, "A forward-secure public-key encryption scheme," in Advances in Cryptology - EUROCRYPT 2003. Lecture Notes in Computer Science, vol. 2656, pp. 255-271, 2003.
-
(2003)
Advances in Cryptology - EUROCRYPT 2003. Lecture Notes in Computer Science
, vol.2656
, pp. 255-271
-
-
Canetti, R.1
Halevi, S.2
Katz, J.3
-
31
-
-
35248901924
-
Public key broadcast encryption for stateless receivers
-
Y. Dodis and N. Fazio, "Public key broadcast encryption for stateless receivers," in Digital Rights Management Wrokshop, Lecture Notes in Computer Science, vol. 2696, pp. 61-80, 2002.
-
(2002)
Digital Rights Management Wrokshop, Lecture Notes in Computer Science
, vol.2696
, pp. 61-80
-
-
Dodis, Y.1
Fazio, N.2
|