-
1
-
-
85180411878
-
Improved proxy re-encryption schemes with applications to secure distributed storage
-
The Internet Society
-
Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. In: Proceedings of the Network and Distributed System Security Symposium, NDSS 2005. The Internet Society (2005)
-
(2005)
Proceedings of the Network and Distributed System Security Symposium, NDSS 2005
-
-
Ateniese, G.1
Fu, K.2
Green, M.3
Hohenberger, S.4
-
2
-
-
68849097854
-
Dual-policy attribute based encryption
-
Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.) ACNS 2009. Springer, Heidelberg
-
Attrapadung, N., Imai, H.: Dual-policy attribute based encryption. In: Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.) ACNS 2009. LNCS, vol. 5536, pp. 168-185. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5536
, pp. 168-185
-
-
Attrapadung, N.1
Imai, H.2
-
3
-
-
34548731375
-
Ciphertext-policy attribute-based encryption
-
Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, SP 2007, pp. 321-334 (2007)
-
(2007)
IEEE Symposium on Security and Privacy, SP 2007
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
4
-
-
84957718934
-
Divertible protocols and atomic proxy cryptography
-
Nyberg, K. (ed.) EUROCRYPT 1998. Springer, Heidelberg
-
Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127-144. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1403
, pp. 127-144
-
-
Blaze, M.1
Bleumer, G.2
Strauss, M.3
-
5
-
-
70350357342
-
Attribute-sets: A practically motivated enhancement to attribute-based encryption
-
Backes, M., Ning, P. (eds.) ESORICS 2009. Springer, Heidelberg
-
Bobba, R., Khurana, H., Prabhakaran, M.: Attribute-sets: A practically motivated enhancement to attribute-based encryption. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 587-604. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5789
, pp. 587-604
-
-
Bobba, R.1
Khurana, H.2
Prabhakaran, M.3
-
6
-
-
84874324906
-
Identity-based encryption from the weil pairing
-
Kilian, J. (ed.) CRYPTO 2001. Springer, Heidelberg
-
Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213-229. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
7
-
-
38049078557
-
Multi-authority attribute based encryption
-
Vadhan, S.P. (ed.) TCC 2007. Springer, Heidelberg
-
Chase, M.: Multi-authority attribute based encryption. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 515-534. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4392
, pp. 515-534
-
-
Chase, M.1
-
8
-
-
74049163235
-
Improving privacy and security in multi-authority attribute-based encryption
-
ACM, New York
-
Chase, M., Chow, S.S.: Improving privacy and security in multi-authority attribute-based encryption. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS 2009, pp. 121-130. ACM, New York (2009)
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS 2009
, pp. 121-130
-
-
Chase, M.1
Chow, S.S.2
-
9
-
-
45749116552
-
Provably secure ciphertext policy abe
-
ACM, New York
-
Cheung, L., Newport, C.: Provably secure ciphertext policy abe. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS 2009, pp. 456-465. ACM, New York (2007)
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS 2009
, pp. 456-465
-
-
Cheung, L.1
Newport, C.2
-
10
-
-
38149038713
-
Identity-based proxy re-encryption without random oracles
-
Garay, J.A., Lenstra, A.K., Mambo, M., Peralta, R. (eds.) ISC 2007. Springer, Heidelberg
-
Chu, C.K., Tzeng, W.G.: Identity-based proxy re-encryption without random oracles. In: Garay, J.A., Lenstra, A.K., Mambo, M., Peralta, R. (eds.) ISC 2007. LNCS, vol. 4779, pp. 189-202. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4779
, pp. 189-202
-
-
Chu, C.K.1
Tzeng, W.G.2
-
11
-
-
70350635850
-
A ciphertext-policy attribute-based encryption scheme with constant ciphertext length
-
Bao, F., Li, H., Wang, G. (eds.) ISPEC 2009. Springer, Heidelberg
-
Emura, K., Miyaji, A., Nomura, A., Omote, K., Soshi, M.: A ciphertext-policy attribute-based encryption scheme with constant ciphertext length. In: Bao, F., Li, H., Wang, G. (eds.) ISPEC 2009. LNCS, vol. 5451, pp. 13-23. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5451
, pp. 13-23
-
-
Emura, K.1
Miyaji, A.2
Nomura, A.3
Omote, K.4
Soshi, M.5
-
12
-
-
49049111604
-
Bounded ciphertext policy attribute based encryption
-
Aceto, L., Damgård, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) ICALP 2008, Part II. Springer, Heidelberg
-
Goyal, V., Jain, A., Pandey, O., Sahai, A.: Bounded ciphertext policy attribute based encryption. In: Aceto, L., Damgård, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) ICALP 2008, Part II. LNCS, vol. 5126, pp. 579-591. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5126
, pp. 579-591
-
-
Goyal, V.1
Jain, A.2
Pandey, O.3
Sahai, A.4
-
13
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
ACM, New York
-
Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, pp. 89-98. ACM, New York (2006)
-
(2006)
Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
14
-
-
38049061546
-
Identity-based proxy re-encryption
-
Katz, J., Yung, M. (eds.) ACNS 2007. Springer, Heidelberg
-
Green, M., Ateniese, G.: Identity-based proxy re-encryption. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 288-306. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4521
, pp. 288-306
-
-
Green, M.1
Ateniese, G.2
-
15
-
-
57049171407
-
Attribute-based re-encryption scheme in the standard model
-
Guo, S., Zeng, Y., Wei, J., Xu, Q.: Attribute-based re-encryption scheme in the standard model. Wuhan University Journal of Natural Sciences 13(5), 621-625 (2008)
-
(2008)
Wuhan University Journal of Natural Sciences
, vol.13
, Issue.5
, pp. 621-625
-
-
Guo, S.1
Zeng, Y.2
Wei, J.3
Xu, Q.4
-
16
-
-
44449129423
-
Predicate encryption supporting disjunctions, polynomial equations, and inner products
-
Smart, N.P. (ed.) EUROCRYPT 2008. Springer, Heidelberg
-
Katz, J., Sahai, A., Waters, B.: Predicate encryption supporting disjunctions, polynomial equations, and inner products. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 146-162. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4965
, pp. 146-162
-
-
Katz, J.1
Sahai, A.2
Waters, B.3
-
17
-
-
77949581448
-
New techniques for dual system encryption and fully secure hibe with short ciphertexts
-
Micciancio, D. (ed.) TCC 2010. Springer, Heidelberg
-
Lewko, A., Waters, B.: New techniques for dual system encryption and fully secure hibe with short ciphertexts. In: Micciancio, D. (ed.) TCC 2010. LNCS, vol. 5978, pp. 455-479. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.5978
, pp. 455-479
-
-
Lewko, A.1
Waters, B.2
-
18
-
-
77954635558
-
Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption
-
Gilbert, H. (ed.) EUROCRYPT 2010. Springer, Heidelberg
-
Lewko, A.B., Okamoto, T., Sahai, A., Takashima, K., Waters, B.: Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 62-91. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6110
, pp. 62-91
-
-
Lewko, A.B.1
Okamoto, T.2
Sahai, A.3
Takashima, K.4
Waters, B.5
-
19
-
-
77952362084
-
Attribute based proxy re-encryption with delegating capabilities
-
ACM, New York
-
Liang, X., Cao, Z., Lin, H., Shao, J.: Attribute based proxy re-encryption with delegating capabilities. In: Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, ASIACCS 2009, pp. 276-286. ACM, New York (2009)
-
(2009)
Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, ASIACCS 2009
, pp. 276-286
-
-
Liang, X.1
Cao, Z.2
Lin, H.3
Shao, J.4
-
20
-
-
0030687206
-
Proxy cryptosystems: Delegation of the power to decrypt ciphertexts
-
Mambo, M., Okamoto, E.: Proxy cryptosystems: Delegation of the power to decrypt ciphertexts. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences 80(1), 54-63 (1997)
-
(1997)
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
, vol.80
, Issue.1
, pp. 54-63
-
-
Mambo, M.1
Okamoto, E.2
-
21
-
-
50049099260
-
Proxy re-encryption systems for identity-based encryption
-
Takagi, T., Okamoto, T., Okamoto, E., Okamoto, T. (eds.) Pairing 2007. Springer, Heidelberg
-
Matsuo, T.: Proxy re-encryption systems for identity-based encryption. In: Takagi, T., Okamoto, T., Okamoto, E., Okamoto, T. (eds.) Pairing 2007. LNCS, vol. 4575, pp. 247-267. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4575
, pp. 247-267
-
-
Matsuo, T.1
-
22
-
-
45749094622
-
Attribute-based encryption with partially hidden encryptor-specified access structures
-
Bellovin, S.M., Gennaro, R., Keromytis, A.D., Yung, M. (eds.) ACNS 2008. Springer, Heidelberg
-
Nishide, T., Yoneyama, K., Ohta, K.: Attribute-based encryption with partially hidden encryptor-specified access structures. In: Bellovin, S.M., Gennaro, R., Keromytis, A.D., Yung, M. (eds.) ACNS 2008. LNCS, vol. 5037, pp. 111-129. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5037
, pp. 111-129
-
-
Nishide, T.1
Yoneyama, K.2
Ohta, K.3
-
23
-
-
72449208663
-
Hierarchical predicate encryption for inner-products
-
Matsui, M. (ed.) ASIACRYPT 2009. Springer, Heidelberg
-
Okamoto, T., Takashima, K.: Hierarchical predicate encryption for inner-products. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 214-231. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5912
, pp. 214-231
-
-
Okamoto, T.1
Takashima, K.2
-
24
-
-
24944554962
-
Fuzzy identity-based encryption
-
Cramer, R. (ed.) EUROCRYPT 2005. Springer, Heidelberg
-
Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457-473. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 457-473
-
-
Sahai, A.1
Waters, B.2
-
25
-
-
69649091318
-
Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization
-
ePrint Archive, Report 2008/290
-
Waters, B.: Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization. Cryptology ePrint Archive, Report 2008/290 (2008), http://eprint.iacr.org/
-
(2008)
Cryptology
-
-
Waters, B.1
-
26
-
-
70350345210
-
Dual system encryption: Realizing fully secure ibe and hibe under simple assumptions
-
Halevi, S. (ed.) CRYPTO 2009. Springer, Heidelberg
-
Waters, B.: Dual system encryption: Realizing fully secure ibe and hibe under simple assumptions. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 619-636. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5677
, pp. 619-636
-
-
Waters, B.1
|