-
1
-
-
35048901123
-
Public key encryption with keyword search
-
Cachin, C., Camenisch, J. (eds.) Springer, Heidelberg
-
Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506-522. Springer, Heidelberg (2004)
-
(2004)
Eurocrypt 2004 LNCS
, vol.3027
, pp. 506-522
-
-
Boneh, D.1
Di Crescenzo, G.2
Ostrovsky, R.3
Persiano, G.4
-
2
-
-
0037623983
-
Identity based encryption from the weil pairing
-
Boneh, D., Franklin, M.K.: Identity based encryption from the Weil pairing. SIAM Journal on Computing 32(3), 586-615 (2003)
-
(2003)
SIAM Journal on Computing
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.K.2
-
3
-
-
24144433396
-
Evaluating 2-DNF formulas on ciphertexts
-
Kilian, J. (ed. Springer, Heidelberg
-
Boneh, D., Goh, E.-J., Nissim, K.: Evaluating 2-DNF formulas on ciphertexts. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 325-341. Springer, Heidelberg (2005)
-
(2005)
TCC 2005 LNCS
, vol.3378
, pp. 325-341
-
-
Boneh, D.1
Goh, E.-J.2
Nissim, K.3
-
4
-
-
35248874429
-
Multipurpose identity-based signcryption a swiss army knife for identity-based cryptography
-
Boneh, D. (ed. Springer, Heidelberg (
-
Boyen, X.: Multipurpose identity-based signcryption (a swiss army knife for identity-based cryptography). In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 383-399. Springer, Heidelberg (2003)
-
(2003)
Crypto 2003 LNCS
, vol.2729
, pp. 383-399
-
-
Boyen, X.1
-
5
-
-
33749573228
-
Anonymous hierarchical identity-based encryption (Without random oracles)
-
Advances in Cryptology - CRYPTO 2006 - 26th Annual International Cryptology Conference, Proceedings
-
Boyen, X., Waters, B.: Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles). In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 290-307. Springer, Heidelberg (2006) (Pubitemid 44532122)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4117
, pp. 290-307
-
-
Boyen, X.1
Waters, B.2
-
6
-
-
78650264424
-
Fully secure anonymous HIBE and secret- key anonymous IBE with short ciphertexts
-
De Caro, A., Iovino, V., Persiano, G.: Fully Secure Anonymous HIBE and Secret- Key Anonymous IBE with Short Ciphertexts. Cryptology ePrint Archive, Report 2010/197 (2010),
-
(2010)
Cryptology ePrint Archive Report 2010
, vol.197
-
-
De Caro, A.1
Iovino, V.2
Persiano, G.3
-
7
-
-
77954654490
-
Bonsai trees or how to delegate a lattice basis
-
Gilbert, H. (ed.
-
Cash, D., Hofheinz, D., Kiltz, E., Peikert, C.: Bonsai trees, or how to delegate a lattice basis. In: Gilbert, H. (ed.) EUROCRYPT 2010, pp. 523-552 (2010)
-
(2010)
Eurocrypt 2010
, pp. 523-552
-
-
Cash, D.1
Hofheinz, D.2
Kiltz, E.3
Peikert, C.4
-
8
-
-
77950151506
-
An identity based encryption scheme based on quadratic residues
-
Honary, B. (ed. LNCS Springer, Heidelberg
-
Cocks, C.: An identity based encryption scheme based on quadratic residues. In: Honary, B. (ed.) Cryptography and Coding 2001. LNCS, vol. 2260, pp. 360-363. Springer, Heidelberg (2001)
-
(2001)
Cryptography and Coding 2001
, vol.2260
, pp. 360-363
-
-
Cocks, C.1
-
9
-
-
77954639466
-
Converting pairing-based cryptosystems from composite-order groups to prime-order groups
-
Gilbert, H. (ed. Springer, Heidelberg
-
Freeman, D.M.: Converting pairing-based cryptosystems from composite-order groups to prime-order groups. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 44-61. Springer, Heidelberg (2010)
-
(2010)
Eurocrypt 2010 LNCS
, vol.6110
, pp. 44-61
-
-
Freeman, D.M.1
-
10
-
-
84947242701
-
Toward hierarchical identity-based encryption
-
Knudsen, L.R. (ed. Springer, Heidelberg
-
Horwitz, J., Lynn, B.: Toward hierarchical identity-based encryption. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 466-481. Springer, Heidelberg (2002)
-
(2002)
Eurocrypt 2002 LNCS
, vol.2332
, pp. 466-481
-
-
Horwitz, J.1
Lynn, B.2
-
11
-
-
77954635558
-
Fully secure functional encryption: Attribute-based encryption and hierarchical inner product encryption
-
Gilbert, H. (ed. Springer, Heidelberg
-
Lewko, A., Okamoto, T., Sahai, A., Takashima, K., Waters, B.: Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 62-91. Springer, Heidelberg (2010)
-
(2010)
Eurocrypt 2010 LNCS
, vol.6110
, pp. 62-91
-
-
Lewko, A.1
Okamoto, T.2
Sahai, A.3
Takashima, K.4
Waters, B.5
-
12
-
-
77949581448
-
New techniques for dual system encryption and fully secure hibe with short ciphertexts
-
Micciancio, D. (ed. Springer, Heidelberg
-
Lewko, A.B., Waters, B.: New techniques for dual system encryption and fully secure hibe with short ciphertexts. In: Micciancio, D. (ed.) TCC 2010. LNCS, vol. 5978, pp. 455-479. Springer, Heidelberg (2010)
-
(2010)
TCC 2010 LNCS
, vol.5978
, pp. 455-479
-
-
Lewko, A.B.1
Waters, B.2
-
13
-
-
67049108616
-
Anonymous hierarchical identity-based encryption with constant size ciphertexts
-
Jarecki, S., Tsudik, G. (eds.) Springer, Heidelberg
-
Seo, J.H., Kobayashi, T., Ohkubo, M., Suzuki, K.: Anonymous hierarchical identity-based encryption with constant size ciphertexts. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol. 5443, pp. 215-234. Springer, Heidelberg (2009)
-
(2009)
PKC 2009 LNCS
, vol.5443
, pp. 215-234
-
-
Seo, J.H.1
Kobayashi, T.2
Ohkubo, M.3
Suzuki, K.4
-
14
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Blakely, G.R., Chaum, D. (eds.) Springer, Heidelberg
-
Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47-53. Springer, Heidelberg (1985)
-
(1985)
Crypto 1984 LNCS
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
15
-
-
70350649061
-
Predicate privacy in encryption systems
-
Reingold, O. (ed. Springer, Heidelberg
-
Shen, E., Shi, E.,Waters, B.: Predicate privacy in encryption systems. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 457-473. Springer, Heidelberg (2009)
-
(2009)
TCC 2009 LNCS
, vol.5444
, pp. 457-473
-
-
Shen, E.1
Shi, E.2
Waters, B.3
-
16
-
-
49049104392
-
Delegating capabilities in predicate encryption systems
-
Aceto, L., Damgård, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds. Springer, Heidelberg (
-
Shi, E., Waters, B.: Delegating capabilities in predicate encryption systems. In: Aceto, L., Damgård, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) ICALP 2008. LNCS, vol. 5126, pp. 560-578. Springer, Heidelberg (2008)
-
(2008)
ICALP 2008 LNCS
, vol.5126
, pp. 560-578
-
-
Shi, E.1
Waters, B.2
-
17
-
-
70350345210
-
Dual system encryption: Realizing fully secure IBE and HIBE under simple assumptions
-
Halevi, S. (ed. Springer, Heidelberg (
-
Waters, B.: Dual system encryption: Realizing fully secure IBE and HIBE under simple assumptions. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 619-636. Springer, Heidelberg (2009)
-
(2009)
Crypto 2009 LNCS
, vol.5677
, pp. 619-636
-
-
Waters, B.1
|