-
1
-
-
33745134401
-
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
-
Advances in Cryptology - CRYPTO 2005 - 25th Annual International Cryptology Conference, Proceedings
-
Abdalla M., Bellare M., Catalano D., Kiltz E., Kohno T., Lange T., Malone-Lee J., Neven G., Paillier P., Shi H.: Searchable encryption revisited: consistency properties, relation to anonymous IBE, and extentions. In: CRYPTO'05, vol. 3621, pp. 205-222. (2005). (Pubitemid 43902115)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3621
, pp. 205-222
-
-
Abdalla, M.1
Bellare, M.2
Catalano, D.3
Kiltz, E.4
Kohno, T.5
Lange, T.6
Malone-Lee, J.7
Neven, G.8
Paillier, P.9
Shi, H.10
-
2
-
-
34548731375
-
Ciphertext-policy attribute-based encryption
-
DOI 10.1109/SP.2007.11, 4223236, Proceedings - S and P 2007: 2007 IEEE Symposium on Security and Privacy, SP'07
-
Bethancourt J., Sahai A., Waters B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, pp. 321-334. (2007). (Pubitemid 47432538)
-
(2007)
Proceedings - IEEE Symposium on Security and Privacy
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
3
-
-
35048841300
-
Efficient selective-ID secure identity based encryption without random oracles
-
Boneh D., Boyen X.: Efficient selective-ID secure identity based encryption without random oracles. In: EUROCRYPT'04, vol. 3027, pp. 223-238. (2004).
-
(2004)
EUROCRYPT'04
, vol.3027
, pp. 223-238
-
-
Boneh, D.1
Boyen, X.2
-
4
-
-
35048887476
-
Short group signatures
-
Boneh D., Boyen X., Shacham H.: Short group signatures, In: CRYPTO'04, vol. 3152, pp. 41-55 (2004).
-
(2004)
CRYPTO'04
, vol.3152
, pp. 41-55
-
-
Boneh, D.1
Boyen, X.2
Shacham, H.3
-
5
-
-
35048901123
-
Public key encryption with keyword search
-
Boneh D., Crescenzo G.D., Octrovsky R., Persiano G., Public key encryption with keyword search. In: EUROCRYPT'04. vol. 3027, pp. 506-522. (2004).
-
(2004)
EUROCRYPT'04
, vol.3027
, pp. 506-522
-
-
Boneh, D.1
Crescenzo, G.D.2
Octrovsky, R.3
Persiano, G.4
-
6
-
-
84874324906
-
Identity-Based Encryption from the Weil Pairing
-
Advances in Cryptology - CRYPTO 2001
-
Boneh D., Franklin M., Identity-based encryption from the Weil pairing. In: CRYPTO'01, vol. 2139, pp. 213-229. (2001). (Pubitemid 33317917)
-
(2001)
Lecture Notes in Computer Science
, Issue.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
7
-
-
43149116953
-
Space-efficient identity based encryption without pairings
-
Boneh D., Gentry C., Hamburg M.: Space-efficient identity based encryption without pairings. In: FOCS'07, pp. 647-657. (2007).
-
(2007)
FOCS'07
, pp. 647-657
-
-
Boneh, D.1
Gentry, C.2
Hamburg, M.3
-
8
-
-
38049045519
-
Conjunctive, subset, and range queries on encrypted data
-
Boneh D., Waters B.: Conjunctive, subset, and range queries on encrypted data. In: TCC'07, vol. 4392, pp. 535-554. (2007).
-
(2007)
TCC'07
, vol.4392
, pp. 535-554
-
-
Boneh, D.1
Waters, B.2
-
11
-
-
79952188383
-
An identity based encryption scheme based on quadratic residues
-
Cocks C.: An identity based encryption scheme based on quadratic residues. In: IMA'01. (2001).
-
(2001)
IMA'01
-
-
Cocks, C.1
-
13
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
DOI 10.1145/1180405.1180418, 1180418, CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security
-
Goyal V., Pandey O., Sahai A., Waters B.: Attribute-based encryption for fine-grained access control of encrypted data. In: ACM-CCS'06, pp. 89-98. (2006). (Pubitemid 47131359)
-
(2006)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
14
-
-
52149090559
-
Hidden-vector encryption with groups of prime order
-
Iovino V., Persiano G.: Hidden-vector encryption with groups of prime order. In: Pairing'08, vol. 5209, pp. 75-88. (2008).
-
(2008)
Pairing'08
, vol.5209
, pp. 75-88
-
-
Iovino, V.1
Persiano, G.2
-
15
-
-
44449129423
-
Predicate encryption supporting disjunctions, polynomial equations, and inner products
-
DOI 10.1007/978-3-540-78967-3-9, Advances in Cryptology - EUROCRYPT 2008 - 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
-
Katz J., Sahai A., Waters, B.: Predicate encryption supporting disjunctions, polynomial equations, and inner products. In: EUROCRYPT'08, vol. 4965, pp. 146-162 (2008). (Pubitemid 351762828)
-
(2008)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4965
, pp. 146-162
-
-
Katz, J.1
Sahai, A.2
Waters, B.3
-
16
-
-
77957002082
-
Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner-product encryption
-
Lewko A., Okamoto T., Sahai A., Takashima K., Waters B.: Fully secure functional encryption: attribute-based encryption and (hierarchical) inner-product encryption. To appear in EUROCRYPT'10 (2010).
-
(2010)
EUROCRYPT'10
-
-
Lewko, A.1
Okamoto, T.2
Sahai, A.3
Takashima, K.4
Waters, B.5
-
17
-
-
72449208663
-
Hierarchical predicate encryption for inner-products
-
Okamoto T., Takashima K.: Hierarchical predicate encryption for inner-products. In: ASIACRYPT'09, vol. 5912, pp. 214-231 (2009).
-
(2009)
ASIACRYPT'09
, vol.5912
, pp. 214-231
-
-
Okamoto, T.1
Takashima, K.2
-
18
-
-
74049120601
-
Attribute-based encryption with non-monotonic access structures
-
Ostrovsky R., Sahai A., Waters B.: Attribute-based encryption with non-monotonic access structures. In: ACM-CCS'07, pp. 195-203. (2007).
-
(2007)
ACM-CCS'07
, pp. 195-203
-
-
Ostrovsky, R.1
Sahai, A.2
Waters, B.3
-
19
-
-
24944554962
-
Fuzzy identity-based encryption
-
Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
-
Sahai A., Waters B.: Fuzzy identity-based encryption. In: EUROCRYPT'05, vol. 3494, pp. 457-473 (2005). (Pubitemid 41313969)
-
(2005)
Lecture Notes in Computer Science
, vol.3494
, pp. 457-473
-
-
Sahai, A.1
Waters, B.2
-
20
-
-
67049108616
-
Anonymous hierarchical identity-based enryption with constant size ciphertexts
-
Seo J.H., Kobayashi T., Oukubo M., Suzuki K.: Anonymous hierarchical identity-based enryption with constant size ciphertexts. In: PKC'09, vol. 5443, pp. 215-234. (2009).
-
(2009)
PKC'09
, vol.5443
, pp. 215-234
-
-
Seo, J.H.1
Kobayashi, T.2
Oukubo, M.3
Suzuki, K.4
-
21
-
-
24944566040
-
Efficient Identity-Based Encryption without random oracles
-
Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
-
Waters B.: Efficient identity-based encryption without random oracles. In: EUROCRYPT'05, vol. 3494, pp. 114-127. (2005). (Pubitemid 41313949)
-
(2005)
Lecture Notes in Computer Science
, vol.3494
, pp. 114-127
-
-
Waters, B.1
-
22
-
-
70350345210
-
Dual system encryption: Realizing fully secure IBE and HIBE under simple assumptions
-
Waters B.: Dual system encryption: realizing fully secure IBE and HIBE under simple assumptions. In: CRYPTO'09, vol. 5677, pp. 619-636. (2009).
-
(2009)
CRYPTO'09
, vol.5677
, pp. 619-636
-
-
Waters, B.1
|