-
1
-
-
84979291225
-
Broadcast encryption
-
Stinson DR, ed. Berlin, Heidelberg: Springer-Verlag
-
Fiat A, Naor M. Broadcast encryption. In: Stinson DR, ed. Advances in Cryptology-CRYPTO'93. Berlin, Heidelberg: Springer-Verlag, 1994. 480-491.
-
(1994)
Advances in Cryptology-CRYPTO'93
, pp. 480-491
-
-
Fiat, A.1
Naor, M.2
-
2
-
-
84880852861
-
Revocation and tracing schemes for stateless receivers
-
Kilian J, ed. Berlin, Heidelberg: Springer-Verlag
-
Naor D, Naor M, Lotspiech J. Revocation and tracing schemes for stateless receivers. In: Kilian J, ed. Advances in Cryptology-CRYPTO 2001. Berlin, Heidelberg: Springer-Verlag, 2001. 41-62.
-
(2001)
Advances in Cryptology-CRYPTO 2001
, pp. 41-62
-
-
Naor, D.1
Naor, M.2
Lotspiech, J.3
-
3
-
-
33745166648
-
Collusion resistant broadcast encryption with short ciphertexts and private keys
-
Shoup V, ed. Berlin, Heidelberg: Springer-Verlag, [doi:10.1007/11535218_16]
-
Boneh D, Gentry C, Waters B. Collusion resistant broadcast encryption with short ciphertexts and private keys. In: Shoup V, ed. Advances in Crytology-CRYPTO 2005. Berlin, Heidelberg: Springer-Verlag, 2005. 258-275. [doi:10.1007/11535218_16]
-
(2005)
Advances in Crytology-CRYPTO 2005
, pp. 258-275
-
-
Boneh, D.1
Gentry, C.2
Waters, B.3
-
4
-
-
85020598353
-
Identity-Based cryptosystems and signature schemes
-
Blakley GR, Chaum D, eds. Berlin, Heidelberg: Springer-Verlag
-
Shamir A. Identity-Based cryptosystems and signature schemes. In: Blakley GR, Chaum D, eds. Advances in Cryptology-CRYPTO'84. Berlin, Heidelberg: Springer-Verlag, 1984. 47-53.
-
(1984)
Advances in Cryptology-CRYPTO'84
, pp. 47-53
-
-
Shamir, A.1
-
5
-
-
84874324906
-
Identity-Based encryption from the weil pairing
-
Kilian J, ed. LNCS 2139, Berlin, Heidelberg: Springer-Verlag, [doi:10.1007/3-540-44647-8_13]
-
Boneh D, Franklin M. Identity-Based encryption from the weil pairing. In: Kilian J, ed. Advances in Cryptology-CRYPTO 2001. LNCS 2139, Berlin, Heidelberg: Springer-Verlag, 2001. 213-229. [doi:10.1007/3-540-44647-8_13]
-
(2001)
Advances in Cryptology-CRYPTO 2001
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
6
-
-
24944554962
-
Fuzzy identity-based encryption
-
Cramer R, ed. Berlin, Heidelberg: Springer-Verlag
-
Sahai A, Waters B. Fuzzy identity-based encryption. In: Cramer R, ed. Advances in Cryptology-EUROCRYPT 2005. Berlin, Heidelberg: Springer-Verlag, 2005. 457-473.
-
(2005)
Advances in Cryptology-EUROCRYPT 2005
, pp. 457-473
-
-
Sahai, A.1
Waters, B.2
-
7
-
-
34547273527
-
Attribute-Based encryption for fine-grained access control of encrypted data
-
New York: ACM Press, [doi:10.1145/1180405.1180418]
-
Goyal V, Pandey O, Sahai A, Waters B. Attribute-Based encryption for fine-grained access control of encrypted data. In: Proc. of the 13th ACM Conf. on Computer and Communications Security. New York: ACM Press, 2006. 89-98. [doi:10.1145/1180405.1180418]
-
(2006)
Proc. of the 13th ACM Conf. on Computer and Communications Security
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
8
-
-
58049192731
-
Attribute-Based content distribution with hidden policy
-
Orlando: IEEE Computer Society, [doi:10.1109/NPSEC.2008.4664879]
-
Yu S C, Ren K, Lou W J. Attribute-Based content distribution with hidden policy. In: Proc. of the 4th Workshop on Secure Network Protocols (NPSec). Orlando: IEEE Computer Society, 2008. 39-44. [doi:10.1109/NPSEC.2008.4664879]
-
(2008)
Proc. of the 4th Workshop on Secure Network Protocols (NPSec)
, pp. 39-44
-
-
Yu, S.C.1
Ren, K.2
Lou, W.J.3
-
11
-
-
79959586617
-
Collusion-Resistant group key management using attribute-based encryption
-
Cheung L, Cooley J A, Khazan R, Newport C. Collusion-Resistant group key management using attribute-based encryption. http://eprint.iacr.org/2007/161.pdf
-
-
-
Cheung, L.1
Cooley, J.A.2
Khazan, R.3
Newport, C.4
-
12
-
-
75749102533
-
Attribute-Based on-demand multicast group setup with membership anonymity
-
[doi:10.1016/j.comnet.2009.09.009]
-
Yu S C, Ren K, Lou W J. Attribute-Based on-demand multicast group setup with membership anonymity. Computer Networks, 2010, 54(3): 377-386. [doi:10.1016/j.comnet.2009.09.009]
-
(2010)
Computer Networks
, vol.54
, Issue.3
, pp. 377-386
-
-
Yu, S.C.1
Ren, K.2
Lou, W.J.3
-
13
-
-
70450257780
-
Persona: An online social network with user-defined privacy
-
New York: ACM Press, [doi:10.1145/1592568.1592585]
-
Baden R, Bender A, Spring N, Bhattacharjee B, Starin D.Persona: An online social network with user-defined privacy. In: Proc. of the ACM SIGCOMM 2009 Conf. on Data Communication. New York: ACM Press, 2009. 135-146. [doi:10.1145/1592568.1592585]
-
(2009)
Proc. of the ACM SIGCOMM 2009 Conf. on Data Communication
, pp. 135-146
-
-
Baden, R.1
Bender, A.2
Spring, N.3
Bhattacharjee, B.4
Starin, D.5
-
15
-
-
0003745894
-
Secure schemes for secret sharing and key distribution
-
[Ph.D. Thesis]. Technion: Israel Institute of Technology
-
Beimel A. Secure schemes for secret sharing and key distribution [Ph.D. Thesis]. Technion: Israel Institute of Technology, 1996.
-
(1996)
-
-
Beimel, A.1
-
16
-
-
79959608304
-
Research on attribute-based cryptosystem
-
[MS. Thesis]. Shanghai: Shanghai Jiaotong University Press, (in Chinese)
-
Liang X H. Research on attribute-based cryptosystem [MS. Thesis]. Shanghai: Shanghai Jiaotong University Press, 2009 (in Chinese).
-
(2009)
-
-
Liang, X.H.1
-
17
-
-
77955211933
-
Revocation systems with very small private keys
-
Washington: IEEE Computer Society, [doi:10.1109/SP.2010.23]
-
Lewko A, Sahai A, Waters B. Revocation systems with very small private keys. In: Proc. of the IEEE Symp. on Security and Privacy. Washington: IEEE Computer Society, 2010. 273-285. [doi:10.1109/SP.2010.23]
-
(2010)
Proc. of the IEEE Symp. on Security and Privacy
, pp. 273-285
-
-
Lewko, A.1
Sahai, A.2
Waters, B.3
-
18
-
-
0018545449
-
How to share a secret
-
[doi:10.1145/359168.359176]
-
Shamir A. How to share a secret. Communications of the ACM, 1979, 22(11): 612-613. [doi:10.1145/359168.359176]
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
19
-
-
34547325357
-
Secure attribute-based systems
-
New York: ACM Press, [doi:10.1145/1180405.1180419]
-
Pirretti M, Traynor P, Mcdaniel P, Waters B. Secure attribute-based systems. In: Proc. of the ACM Conf. on Computer and Communications Security. New York: ACM Press, 2006. 99-112. [doi:10.1145/1180405.1180419]
-
(2006)
Proc. of the ACM Conf. on Computer and Communications Security
, pp. 99-112
-
-
Pirretti, M.1
Traynor, P.2
Mcdaniel, P.3
Waters, B.4
-
22
-
-
84944319284
-
Efficient trace and revoke schemes
-
Frankel Y, ed. Berlin, Heidelberg: Springer-Verlag, [doi:10.1007/978-3-540-68914-0_7]
-
Naor M, Pinkas B. Efficient trace and revoke schemes. In: Frankel Y, ed. Proc. of the Financial Cryptography. Berlin, Heidelberg: Springer-Verlag, 2001. 1-20. [doi:10.1007/978-3-540-68914-0_7]
-
(2001)
Proc. of the Financial Cryptography
, pp. 1-20
-
-
Naor, M.1
Pinkas, B.2
-
23
-
-
45749094622
-
Attribute-Based encryption with partially hidden encryptor-specified access structures
-
Bellovin SM, Gennaro R, Keromytis A, Yung M, eds. Berlin, Heidelberg: Springer-Verlag, [doi:10.1007/978-3-540-68914-0_7]
-
Nishide T, Yoneyama K, Ohta K. Attribute-Based encryption with partially hidden encryptor-specified access structures. In: Bellovin SM, Gennaro R, Keromytis A, Yung M, eds. Proc. of the Applied Cryptography and Network Security. Berlin, Heidelberg: Springer-Verlag, 2008. 111-129. [doi:10.1007/978-3-540-68914-0_7]
-
(2008)
Proc. of the Applied Cryptography and Network Security
, pp. 111-129
-
-
Nishide, T.1
Yoneyama, K.2
Ohta, K.3
-
24
-
-
70350635850
-
A ciphertext-policy attribute-based encryption scheme with constant ciphertext length
-
Bao F, Li H, Wang G, eds. Berlin, Heidelberg: Springer-Verlag, [doi:10.1007/978-3-642-00843-6_2]
-
Emura K, Miyaji A, Nomura A, Omote K, Soshi M. A ciphertext-policy attribute-based encryption scheme with constant ciphertext length. In: Bao F, Li H, Wang G, eds. Proc. of the Information Security Practice and Experience (ISPEC 2009). Berlin, Heidelberg: Springer-Verlag, 2009. 13-23. [doi:10.1007/978-3-642-00843-6_2]
-
(2009)
Proc. of the Information Security Practice and Experience (ISPEC 2009)
, pp. 13-23
-
-
Emura, K.1
Miyaji, A.2
Nomura, A.3
Omote, K.4
Soshi, M.5
-
25
-
-
35048852705
-
Chosen-Ciphertext security from identity-based encryption
-
Berlin, Heidelberg: Springer-Verlag
-
Canetti R, Halevi S, Katz J. Chosen-Ciphertext security from identity-based encryption. In: Advances in Cryptology-EUROCRYPT 2004. Berlin, Heidelberg: Springer-Verlag, 2004. 207-222.
-
(2004)
Advances in Cryptology-EUROCRYPT 2004
, pp. 207-222
-
-
Canetti, R.1
Halevi, S.2
Katz, J.3
-
26
-
-
38049045519
-
Conjunctive, subset, and range queries on encrypted data
-
Berlin, Heidelberg: Springer-Verlag, [doi:10.1007/978-3-540-70936-7_29]
-
Boneh D, Waters B. Conjunctive, subset, and range queries on encrypted data. In: Proc. of the Theory of Cryptography Conf. (TCC). Berlin, Heidelberg: Springer-Verlag, 2007. 535-554. [doi:10.1007/978-3-540-70936-7_29]
-
(2007)
Proc. of the Theory of Cryptography Conf. (TCC)
, pp. 535-554
-
-
Boneh, D.1
Waters, B.2
-
27
-
-
49049111604
-
Bounded ciphertext policy attribute based encryption
-
Aceto L, Damgård I, Goldberg LA, Halldórsson M M, Ingólfsdóttir A, Walukiewicz I, eds. Berlin, Heidelberg: Springer-Verlag, [doi:10.1007/978-3-540-70583-3_47]
-
Goyal V, Jain A, Pandey O, Sahai A. Bounded ciphertext policy attribute based encryption. In: Aceto L, Damgård I, Goldberg LA, Halldórsson M M, Ingólfsdóttir A, Walukiewicz I, eds. Proc. of the ICALP 2008. Berlin, Heidelberg: Springer-Verlag, 2008. 579-591. [doi:10.1007/978-3-540-70583-3_47]
-
(2008)
Proc. of the ICALP 2008
, pp. 579-591
-
-
Goyal, V.1
Jain, A.2
Pandey, O.3
Sahai, A.4
-
28
-
-
77952407083
-
Provably secure and efficient bounded ciphertext policy attribute based encryption
-
New York: ACM Press, [doi:10.1145/1533057.1533102]
-
Liang X H, Cao Z F, Lin H, Xing D S. Provably secure and efficient bounded ciphertext policy attribute based encryption. In: Proc. of the ASIAN ACM Symp. on Information, Computer and Communications Security (ASIACCS 2009). New York: ACM Press, 2009. 343-352. [doi:10.1145/1533057.1533102]
-
(2009)
Proc. of the ASIAN ACM Symp. on Information, Computer and Communications Security (ASIACCS 2009)
, pp. 343-352
-
-
Liang, X.H.1
Cao, Z.F.2
Lin, H.3
Xing, D.S.4
-
29
-
-
70350630621
-
Efficient and provable secure ciphertext-policy attribute-based encryption schemes
-
Berlin, Heidelberg: Springer-Verlag, [doi:10.1007/978-3-642-00843-6_1]
-
Ibraimi L, Tang Q, Hartel P, Jonker W. Efficient and provable secure ciphertext-policy attribute-based encryption schemes. In: Proc. of the Information Security Practice and Experience. Berlin, Heidelberg: Springer-Verlag, 2009. 1-12. [doi:10.1007/978-3-642-00843-6_1]
-
(2009)
Proc. of the Information Security Practice and Experience
, pp. 1-12
-
-
Ibraimi, L.1
Tang, Q.2
Hartel, P.3
Jonker, W.4
-
30
-
-
79952521560
-
Ciphertext-Policy attribute-based encryption: An expressive, efficient, and provably secure realization
-
[doi:10.1007/978-3-642-19379-8_4]
-
Waters B. Ciphertext-Policy attribute-based encryption: An expressive, efficient, and provably secure realization. http://eprint.iacr.org/2008/290.pdf [doi:10.1007/978-3-642-19379-8_4]
-
-
-
Waters, B.1
-
31
-
-
69949143544
-
Conjunctive broadcast and attribute-based encryption
-
Shacham H, Waters B, eds. Berlin, Heidelberg: Springer-Verlag, [doi:10.1007/978-3-642-03298-1_16]
-
Attrapadung N, Imai H. Conjunctive broadcast and attribute-based encryption. In: Shacham H, Waters B, eds. Proc. of the Pairing-Based Cryptography-Pairing 2009. Berlin, Heidelberg: Springer-Verlag, 2009. 248-265. [doi:10.1007/978-3-642-03298-1_16]
-
(2009)
Proc. of the Pairing-Based Cryptography-Pairing 2009
, pp. 248-265
-
-
Attrapadung, N.1
Imai, H.2
-
32
-
-
77954635558
-
Fully secure functional encryption: Attribute-Based encryption and (hierarchical) inner product encryption
-
LNCS 6110, Berlin, Heidelberg: Springer-Verlag, [doi:10.1007/978-3-642-13190-5_4]
-
Lewko A, Okamoto T, Sahai A, Takashima K, Waters B. Fully secure functional encryption: Attribute-Based encryption and (hierarchical) inner product encryption. In: Advances in Cryptology-EUROCRYPT 2010. LNCS 6110, Berlin, Heidelberg: Springer-Verlag, 2010. 62-91. [doi:10.1007/978-3-642-13190-5_4]
-
(2010)
Cryptology-EUROCRYPT 2010
-
-
Lewko, A.1
Okamoto, T.2
Sahai, A.3
Takashima, K.4
Waters, B.5
-
33
-
-
70350345210
-
Dual system encryption: Realizing fully secure ibe and hibe under simple assumptions
-
Halevi S, ed. Berlin, Heidelberg: Springer-Verlag, [doi:10.1007/978-3-642-03356-8_36]
-
Waters B. Dual system encryption: Realizing fully secure ibe and hibe under simple assumptions. In: Halevi S, ed. Advances in Cryptology-CRYTO 2009. Berlin, Heidelberg: Springer-Verlag, 2009. 619-636. [doi:10.1007/978-3-642-03356-8_36]
-
(2009)
Advances in Cryptology-CRYTO 2009
, pp. 619-636
-
-
Waters, B.1
-
34
-
-
77949581448
-
New techniques for dual system encryption and fully secure hibe with short ciphertexts
-
Berlin, Heidelberg: Springer-Verlag, [doi:10.1007/978-3-642-11799-2_27]
-
Lewko A, Waters B. New techniques for dual system encryption and fully secure hibe with short ciphertexts. In: Proc. of the 7th Theory of Cryptography Conf. (TCC 2010). Berlin, Heidelberg: Springer-Verlag, 2010. 455-479. [doi:10.1007/978-3-642-11799-2_27]
-
(2010)
Proc. of the 7th Theory of Cryptography Conf. (TCC 2010)
, pp. 455-479
-
-
Lewko, A.1
Waters, B.2
-
35
-
-
72449201970
-
Attribute-Based encryption supporting direct/indirect revocation modes
-
Parker MG, ed. Berlin, Heidelberg: Springer-Verlag, [doi:10.1007/978-3-642-10868-6_17]
-
Attrapadung N, Imai H. Attribute-Based encryption supporting direct/indirect revocation modes. In: Parker MG, ed. Proc. of the Cryptography and Coding 2009. Berlin, Heidelberg: Springer-Verlag, 2009. 278-300. [doi:10.1007/978-3-642-10868-6_17]
-
(2009)
Proc. of the Cryptography and Coding 2009
, pp. 278-300
-
-
Attrapadung, N.1
Imai, H.2
-
37
-
-
76649143738
-
Mediated ciphertext-policy attribute-based encryption and its application
-
LNCS 5932, Berlin, Heidelberg: Springer-Verlag, [doi:10.1007/978-3-642-10838-9_23]
-
Ibraimi L, Petkovic M, Nikova S, Hartel P, Jonker W. Mediated ciphertext-policy attribute-based encryption and its application. In: Proc. of the 10th Int'l Workshop on Information Security Applications-WISA 2009. LNCS 5932, Berlin, Heidelberg: Springer-Verlag, 2009. 309-323. [doi:10.1007/978-3-642-10838-9_23]
-
(2009)
Proc. of the 10th Int'l Workshop on Information Security Applications-WISA 2009)
, pp. 309-323
-
-
Ibraimi, L.1
Petkovic, M.2
Nikova, S.3
Hartel, P.4
Jonker, W.5
-
38
-
-
77954471010
-
Attribute based data sharing with attribute revocation
-
New York: ACM Press, [doi:10.1145/1755688.1755720]
-
Yu S C, Wang C, Ren K, Lou W J. Attribute based data sharing with attribute revocation. In: Proc. of the ASIAN ACM Conf. on Computer and Communications Security (ASIACCS 2010). New York: ACM Press, 2010. 261-270. [doi:10.1145/1755688.1755720]
-
(2010)
Proc. of the ASIAN ACM Conf. on Computer and Communications Security (ASIACCS 2010)
, pp. 261-270
-
-
Yu, S.C.1
Wang, C.2
Ren, K.3
Lou, W.J.4
-
39
-
-
79956000593
-
2BE: Accountable attribute-based encryption for abuse free access control
-
2BE: Accountable attribute-based encryption for abuse free access control. http://eprint.iacr.org/2009/118.pdf
-
-
-
Li, J.1
Ren, K.2
Kim, K.3
-
40
-
-
70350407157
-
Privacy-Aware attribute-based encryption with user accountability
-
LNCS 5735, Berlin, Heidelberg: Springer-Verlag, [doi:10.1007/978-3-642-04474-8_28]
-
Li J, Ren K, Zhu B, Wan Z G. Privacy-Aware attribute-based encryption with user accountability. In: Proc. of the Information Security Conf. 2009. LNCS 5735, Berlin, Heidelberg: Springer-Verlag, 2009. 347-362. [doi:10.1007/978-3-642-04474-8_28]
-
(2009)
Proc. of the Information Security Conf. 2009
, pp. 347-362
-
-
Li, J.1
Ren, K.2
Zhu, B.3
Wan, Z.G.4
-
41
-
-
84885886363
-
Defending against key abuse attacks in KP-ABE enabled broadcast systems
-
Berlin, Heidelberg: Springer-Verlag, [doi:10.1007/978-3-642-05284-2_18]
-
Yu S C, Ren K, Lou W J, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Proc. of the Security and Privacy in Communication Networks. Berlin, Heidelberg: Springer-Verlag, 2009. 311-329. [doi:10.1007/978-3-642-05284-2_18]
-
(2009)
Proc. of the Security and Privacy in Communication Network
, pp. 311-329
-
-
Yu, S.C.1
Ren, K.2
Lou, W.J.3
Li, J.4
-
42
-
-
33746104815
-
Fully collusion resistant traitor tracing with short ciphertexts and private keys
-
Vaudenay S, ed. LNCS 4004, Berlin, Heidelberg: Springer-Verlag, [doi:10.1007/11761679_34]
-
Boneh D, Sahai A, Waters B. Fully collusion resistant traitor tracing with short ciphertexts and private keys. In: Vaudenay S, ed. Advances in Cryptology-EUROCRYPT 2006. LNCS 4004, Berlin, Heidelberg: Springer-Verlag, 2006. 573-592. [doi:10.1007/11761679_34]
-
(2006)
Advances in Cryptology-EUROCRYPT 2006
, pp. 573-592
-
-
Boneh, D.1
Sahai, A.2
Waters, B.3
-
43
-
-
38049078557
-
Multi-Authority attribute based encryption
-
Berlin, Heidelberg: Springer-Verlag
-
Chase M. Multi-Authority attribute based encryption. In: Proc. of the Theory of Cryptography Conf. (TCC).Berlin, Heidelberg: Springer-Verlag, 2007. 515-534.
-
(2007)
Proc. of the Theory of Cryptography Conf. (TCC)
, pp. 515-534
-
-
Chase, M.1
-
44
-
-
82955217443
-
Multi-Authority attribute based encryption with honest-but-curious central authority
-
Božović V, Socek D, Steinwandt R, Villányi V I. Multi-Authority attribute based encryption with honest-but-curious central authority 2009. http://eprint.iacr.org/2009/083.pdf
-
(2009)
-
-
Božović, V.1
Socek, D.2
Steinwandt, R.3
Villányi, V.I.4
-
45
-
-
58749115565
-
Secure threshold multi authority attribute based encryption without a central authority
-
Chowdhury DR, Rijmen V, Das A, eds. Berlin, Heidelberg: Springer-Verlag, [doi:10.1007/978-3-540-89754-5_33]
-
Lin H, Cao Z F, Liang X, Shao J. Secure threshold multi authority attribute based encryption without a central authority. In: Chowdhury DR, Rijmen V, Das A, eds. Proc. of the Cryptology in India-INDOCRYPT 2008. Berlin, Heidelberg: Springer-Verlag, 2008. 426-436. [doi:10.1007/978-3-540-89754-5_33]
-
(2008)
Proc. of the Cryptology in India-INDOCRYPT 2008
, pp. 426-436
-
-
Lin, H.1
Cao, Z.F.2
Liang, X.3
Shao, J.4
-
46
-
-
74049163235
-
Improving privacy and security in multi-authority attribute-based encryption
-
New York: ACM Press, [doi:10.1145/1653662.1653678]
-
Chase M, Chow S S M. Improving privacy and security in multi-authority attribute-based encryption. In: Proc. of the ACM Conf. on Computer and Communications Security. New York: ACM Press, 2009. 121-130. [doi:10.1145/1653662.1653678]
-
(2009)
Proc. of the ACM Conf. on Computer and Communications Security
, pp. 121-130
-
-
Chase, M.1
Chow, S.S.M.2
-
47
-
-
33846862213
-
Secure distributed key generation for discrete-log based cryptosystems
-
[doi:10.1007/s00145-006-0347-3]
-
Gennaro R, Jarecki S, Krawczyk H, Rabin T. Secure distributed key generation for discrete-log based cryptosystems. Journal of Cryptology, 2007, 20(1): 51-83. [doi:10.1007/s00145-006-0347-3]
-
(2007)
Journal of Cryptology
, vol.20
, Issue.1
, pp. 51-83
-
-
Gennaro, R.1
Jarecki, S.2
Krawczyk, H.3
Rabin, T.4
-
48
-
-
70349289356
-
Black-Box accountable authority identity-based encryption
-
New York: ACM Press, [doi:10.1145/1455770.1455824]
-
Goyal V, Lu S, Sahai A, Waters B. Black-Box accountable authority identity-based encryption. In: Proc. of the ACM Conf. on Computer and Communications Security. New York: ACM Press, 2008. 427-436. [doi:10.1145/1455770.1455824]
-
(2008)
Proc. of the ACM Conf. on Computer and Communications Security
, pp. 427-436
-
-
Goyal, V.1
Lu, S.2
Sahai, A.3
Waters, B.4
-
50
-
-
80053563168
-
Enhancing attribute-based encryption with attribute hierarchy
-
Berlin, Heidelberg: Springer-Verlag, [doi:10.1007/s11036-010-0233-y]
-
Li J, Wang Q, Wang C, Ren K. Enhancing attribute-based encryption with attribute hierarchy. In: Proc. of the Mobile Networks and Applications. Berlin, Heidelberg: Springer-Verlag, 2010. 1-9. [doi:10.1007/s11036-010-0233-y]
-
(2010)
Proc. of the Mobile Networks and Applications
, pp. 1-9
-
-
Li, J.1
Wang, Q.2
Wang, C.3
Ren, K.4
-
51
-
-
77954625601
-
Efficient lattice (H) IBE in the standard model
-
Gilbert H, ed. Berlin, Heidelberg: Springer-Verlag
-
Agrawal S, Boneh D, Boyen X. Efficient lattice (H) IBE in the standard model. In: Gilbert H, ed. Advances in Cryptology-EUROCRYPT 2010. Berlin, Heidelberg: Springer-Verlag, 2010. 553-572.
-
(2010)
Advances in Cryptology-EUROCRYPT 2010
, pp. 553-572
-
-
Agrawal, S.1
Boneh, D.2
Boyen, X.3
-
52
-
-
24944562007
-
Hierarchical identity based encryption with constant size ciphertext
-
Cramer R, ed. Berlin, Heidelberg: Springer-Verlag, [doi:10.1007/11426639_26]
-
Boneh D, Boyen X, Goh E J. Hierarchical identity based encryption with constant size ciphertext. In: Cramer R, ed. Advances in Cryptology-EUROCRYPT 2005. Berlin, Heidelberg: Springer-Verlag, 2005. 440-456. [doi:10.1007/11426639_26]
-
(2005)
Advances in Cryptology-EUROCRYPT 2005
, pp. 440-456
-
-
Boneh, D.1
Boyen, X.2
Goh, E.J.3
-
53
-
-
33749573228
-
Anonymous hierarchical identity-based encryption (without random oracles)
-
Dwork C, ed. Berlin, Heidelberg: Springer-Verlag, [doi:10.1007/11818175_17]
-
Boyen X, Waters B. Anonymous hierarchical identity-based encryption (without random oracles). In: Dwork C, ed. Advances in Cryptology-CRYPTO 2006. Berlin, Heidelberg: Springer-Verlag, 2006. 290-307. [doi:10.1007/11818175_17]
-
(2006)
Advances in Cryptology-CRYPTO 2006
, pp. 290-307
-
-
Boyen, X.1
Waters, B.2
-
55
-
-
14844297376
-
Id-Based encryption for complex hierarchies with applications to forward security and broadcast encryption
-
New York: ACM Press, [doi:10.1145/1030083.1030130]
-
Yao D F, Fazio N, Dodis Y, Lysyanskaya A. Id-Based encryption for complex hierarchies with applications to forward security and broadcast encryption. In: Proc. of the ACM Conf. on Computer and Communications Security. New York: ACM Press, 2004. 354-363. [doi:10.1145/1030083.1030130]
-
(2004)
Proc. of the ACM Conf. on Computer and Communications Security
, pp. 354-363
-
-
Yao, D.F.1
Fazio, N.2
Dodis, Y.3
Lysyanskaya, A.4
-
56
-
-
68849097854
-
Dual-Policy attribute based encryption
-
Abdalla M, Pointcheval D, Fouque P A, Vergnaud D, eds. Berlin, Heidelberg: Springer-Verlag, [doi:10.1007/978-3-642-01957-9_11]
-
Attrapadung N, Imai H. Dual-Policy attribute based encryption. In: Abdalla M, Pointcheval D, Fouque P A, Vergnaud D, eds. Proc. of the Applied Cryptography and Network Security. Berlin, Heidelberg: Springer-Verlag, 2009. 168-185. [doi:10.1007/978-3-642-01957-9_11]
-
(2009)
Proc. of the Applied Cryptography and Network Security
, pp. 168-185
-
-
Attrapadung, N.1
Imai, H.2
|