-
1
-
-
58349086247
-
Generalized identity based and broadcast encryption schemes
-
Melbourne, Australia, Dec. 7-11
-
Boneh D, Hamburg M. Generalized identity based and broadcast encryption schemes. In Proc. the 14th Int. Conf. the Theory and Application of Cryptology and Information Security, Melbourne, Australia, Dec. 7-11, 2008, pp.455-470.
-
(2008)
Proc. The 14th Int. Conf. The Theory and Application of Cryptology and Information Security
, pp. 455-470
-
-
Boneh, D.1
Hamburg, M.2
-
2
-
-
34548731375
-
Ciphertext-policy attribute-based encryption
-
Oakland, USA, May 20-23
-
Bethencourt J, Sahai A, Waters B. Ciphertext-policy attribute-based encryption. In Proc. the IEEE Symposium on Security and Privacy, Oakland, USA, May 20-23, 2007, pp.321-334.
-
(2007)
Proc. The IEEE Symposium on Security and Privacy
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
3
-
-
35048887476
-
Short group signatures
-
Santa Barbara, USA, Aug. 15-19
-
Boneh D, Boyen X, Shacham H. Short group signatures. In Proc. the 24th Annual International Cryptology Conference, Santa Barbara, USA, Aug. 15-19, 2004, pp.41-55.
-
(2004)
Proc. The 24th Annual International Cryptology Conference
, pp. 41-55
-
-
Boneh, D.1
Boyen, X.2
Shacham, H.3
-
4
-
-
76549132748
-
Public key encryption without randomoracle made truly practical
-
(ICICS), Beijing, China, Dec. 14-17
-
Wei P, Wang X, Zheng Y. Public key encryption without randomoracle made truly practical. In Proc. the 11th Int. Conf. Information and Communications Security (ICICS), Beijing, China, Dec. 14-17, 2009, pp.107-120.
-
(2009)
Proc. The 11th Int. Conf. Information and Communications Security
, pp. 107-120
-
-
Wei, P.1
Wang, X.2
Zheng, Y.3
-
5
-
-
24944554962
-
Fuzzy identity-based encryption
-
Aarhus, Denmark, May 22-26
-
Sahai A, Waters B. Fuzzy identity-based encryption. In Proc. the 24th Annual Int. Conf. the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, pp.457-473.
-
(2005)
Proc. The 24th Annual Int. Conf. The Theory and Applications of Cryptographic Techniques
, pp. 457-473
-
-
Sahai, A.1
Waters, B.2
-
6
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
Virginia, USA, Oct. 30-Nov. 3
-
Goyal V, Pandey O, Sahai A, Waters B. Attribute-based encryption for fine-grained access control of encrypted data. In Proc. the 13th ACM Conf. Computer and Communications Security, Virginia, USA, Oct. 30-Nov. 3, 2006, pp.89-98.
-
(2006)
Proc. The 13th ACM Conf. Computer and Communications Security
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
7
-
-
70350676690
-
Threshold attribute-based signatures and their application to anonymous credential systems
-
Gammarth, Tunisia, Jun. 21-25
-
Shahandashti S-F, Safavi-Naini R. Threshold attribute-based signatures and their application to anonymous credential systems. In Proc. the 2nd Int. Conf. Cryptology in Africa, Gammarth, Tunisia, Jun. 21-25, 2009, pp.198-216.
-
(2009)
Proc. The 2nd Int. Conf. Cryptology in Africa
, pp. 198-216
-
-
Shahandashti, S.-F.1
Safavi-Naini, R.2
-
8
-
-
49049111604
-
Bounded ciphertext policy attribute based encryption
-
Reykjavik, Iceland, Jul. 7-11
-
Goyal V, Jain A, Pandey O, Sahai A. Bounded ciphertext policy attribute based encryption. In Proc. the 35th International Colloquium, Reykjavik, Iceland, Jul. 7-11, 2008, pp.579-591.
-
(2008)
Proc. The 35th International Colloquium
, pp. 579-591
-
-
Goyal, V.1
Jain, A.2
Pandey, O.3
Sahai, A.4
-
9
-
-
69649091318
-
Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization
-
Waters B. Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization. Technical Report, Cryptology ePrint archive: Report 2008/290, 2008, http://eprint.iacr.org/2008/290.
-
(2008)
Technical Report, Cryptology EPrint Archive: Report 2008/290
-
-
Waters, B.1
-
11
-
-
33749080076
-
Attributed based access control (abac) for Web services
-
Orlando, USA, July 11-15
-
Yuan E, Tong J. Attributed based access control (abac) for Web services. In Proc. the 2005 IEEE Int. Conf. Web Services, Orlando, USA, July 11-15, 2005, pp.561-569.
-
(2005)
Proc. The 2005 IEEE Int. Conf. Web Services
, pp. 561-569
-
-
Yuan, E.1
Tong, J.2
-
12
-
-
33745815600
-
Property-based broadcast encryption for multi-level security policies
-
(ICISC), Seoul, Korea, Dec. 1-2
-
Adelsbach A, Huber U, Sadeghi A-R. Property-based broadcast encryption for multi-level security policies. In Proc. the 8th International Conference on Information Security and Cryptology (ICISC), Seoul, Korea, Dec. 1-2, 2005, pp.15-31.
-
(2005)
Proc. The 8th International Conference on Information Security and Cryptology
, pp. 15-31
-
-
Adelsbach, A.1
Huber, U.2
Sadeghi, A.-R.3
-
13
-
-
33746064073
-
A broadcast encryption scheme with free-riders but unconditional security
-
Issues, Challenges and Systems (DRMTICS), Sydney, Australia, Oct. 31-Nov. 2
-
Adelsbach A, Greveler U. A broadcast encryption scheme with free-riders but unconditional security. In Proc. the First International Conference on Digital Rights Management: Technologies, Issues, Challenges and Systems (DRMTICS), Sydney, Australia, Oct. 31-Nov. 2, 2005, pp.246-257.
-
(2005)
Proc. The First International Conference on Digital Rights Management: Technologies
, pp. 246-257
-
-
Adelsbach, A.1
Greveler, U.2
-
14
-
-
34548769073
-
Attribute-based publishing with hidden credentials and hidden policies
-
California, USA, Feb. 28-Mar. 2, 2007, The Internet Society
-
Kapadia A, Tsang P P, Smith S W. Attribute-based publishing with hidden credentials and hidden policies. In Proc. the 2007 Network and Distributed System Security Symposium, California, USA, Feb. 28-Mar. 2, 2007, The Internet Society.
-
Proc. The 2007 Network and Distributed System Security Symposium
-
-
Kapadia, A.1
Tsang, P.P.2
Smith, S.W.3
-
15
-
-
67650409731
-
Aspe: Attribute-based secure policy enforcement in vehicular ad hoc networks
-
10.1016/j.adhoc.2009.04.011
-
D Huang M Verma 2009 Aspe: Attribute-based secure policy enforcement in vehicular ad hoc networks Ad Hoc Networks 7 8 1526 1535 10.1016/j.adhoc.2009.04. 011
-
(2009)
Ad Hoc Networks
, vol.7
, Issue.8
, pp. 1526-1535
-
-
Huang, D.1
Verma, M.2
-
17
-
-
38049036820
-
Arithmetic operators for pairing-based cryptography
-
(CHES), Vienna, Austria, Sept. 10-13
-
Beuchat J-L, Brisebarre N, Detrey J, Okamoto E. Arithmetic operators for pairing-based cryptography. In Proc. the 9th International Workshop on Cryptographic Hardware and Embedded Systems (CHES), Vienna, Austria, Sept. 10-13, 2007, pp.239-255.
-
(2007)
Proc. The 9th International Workshop on Cryptographic Hardware and Embedded Systems
, pp. 239-255
-
-
Beuchat, J.-L.1
Brisebarre, N.2
Detrey, J.3
Okamoto, E.4
-
18
-
-
34447338594
-
On a class of pseudorandom sequences from elliptic curves over finite fields
-
DOI 10.1109/TIT.2007.899532
-
H Hu L Hu D Feng 2007 On a class of pseudo-random sequences from elliptic curves over finite fields IEEE Transactions on Information Theory 53 7 2598 2605 10.1109/TIT.2007.899532 2319396 (Pubitemid 47061914)
-
(2007)
IEEE Transactions on Information Theory
, vol.53
, Issue.7
, pp. 2598-2605
-
-
Hu, H.1
Hu, L.2
Feng, D.3
|