메뉴 건너뛰기




Volumn 22, Issue 6, 2011, Pages 1299-1315

Attribute-based encryption schemes

Author keywords

ABE; Access control policy; Key abuse; Multi authorities; Revocation

Indexed keywords

ABE; ACCESS CONTROL POLICY; KEY ABUSE; MULTI-AUTHORITIES; REVOCATION;

EID: 79959612798     PISSN: 10009825     EISSN: None     Source Type: Journal    
DOI: 10.3724/SP.J.1001.2011.03993     Document Type: Article
Times cited : (82)

References (56)
  • 1
    • 84979291225 scopus 로고
    • Broadcast encryption
    • Stinson DR, ed. Berlin, Heidelberg: Springer-Verlag
    • Fiat A, Naor M. Broadcast encryption. In: Stinson DR, ed. Advances in Cryptology-CRYPTO'93. Berlin, Heidelberg: Springer-Verlag, 1994. 480-491.
    • (1994) Advances in Cryptology-CRYPTO'93 , pp. 480-491
    • Fiat, A.1    Naor, M.2
  • 2
    • 84880852861 scopus 로고    scopus 로고
    • Revocation and tracing schemes for stateless receivers
    • Kilian J, ed. Berlin, Heidelberg: Springer-Verlag
    • Naor D, Naor M, Lotspiech J. Revocation and tracing schemes for stateless receivers. In: Kilian J, ed. Advances in Cryptology-CRYPTO 2001. Berlin, Heidelberg: Springer-Verlag, 2001. 41-62.
    • (2001) Advances in Cryptology-CRYPTO 2001 , pp. 41-62
    • Naor, D.1    Naor, M.2    Lotspiech, J.3
  • 3
    • 33745166648 scopus 로고    scopus 로고
    • Collusion resistant broadcast encryption with short ciphertexts and private keys
    • Shoup V, ed. Berlin, Heidelberg: Springer-Verlag, [doi:10.1007/11535218_16]
    • Boneh D, Gentry C, Waters B. Collusion resistant broadcast encryption with short ciphertexts and private keys. In: Shoup V, ed. Advances in Crytology-CRYPTO 2005. Berlin, Heidelberg: Springer-Verlag, 2005. 258-275. [doi:10.1007/11535218_16]
    • (2005) Advances in Crytology-CRYPTO 2005 , pp. 258-275
    • Boneh, D.1    Gentry, C.2    Waters, B.3
  • 4
    • 85020598353 scopus 로고
    • Identity-Based cryptosystems and signature schemes
    • Blakley GR, Chaum D, eds. Berlin, Heidelberg: Springer-Verlag
    • Shamir A. Identity-Based cryptosystems and signature schemes. In: Blakley GR, Chaum D, eds. Advances in Cryptology-CRYPTO'84. Berlin, Heidelberg: Springer-Verlag, 1984. 47-53.
    • (1984) Advances in Cryptology-CRYPTO'84 , pp. 47-53
    • Shamir, A.1
  • 5
    • 84874324906 scopus 로고    scopus 로고
    • Identity-Based encryption from the weil pairing
    • Kilian J, ed. LNCS 2139, Berlin, Heidelberg: Springer-Verlag, [doi:10.1007/3-540-44647-8_13]
    • Boneh D, Franklin M. Identity-Based encryption from the weil pairing. In: Kilian J, ed. Advances in Cryptology-CRYPTO 2001. LNCS 2139, Berlin, Heidelberg: Springer-Verlag, 2001. 213-229. [doi:10.1007/3-540-44647-8_13]
    • (2001) Advances in Cryptology-CRYPTO 2001 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 6
    • 24944554962 scopus 로고    scopus 로고
    • Fuzzy identity-based encryption
    • Cramer R, ed. Berlin, Heidelberg: Springer-Verlag
    • Sahai A, Waters B. Fuzzy identity-based encryption. In: Cramer R, ed. Advances in Cryptology-EUROCRYPT 2005. Berlin, Heidelberg: Springer-Verlag, 2005. 457-473.
    • (2005) Advances in Cryptology-EUROCRYPT 2005 , pp. 457-473
    • Sahai, A.1    Waters, B.2
  • 8
    • 58049192731 scopus 로고    scopus 로고
    • Attribute-Based content distribution with hidden policy
    • Orlando: IEEE Computer Society, [doi:10.1109/NPSEC.2008.4664879]
    • Yu S C, Ren K, Lou W J. Attribute-Based content distribution with hidden policy. In: Proc. of the 4th Workshop on Secure Network Protocols (NPSec). Orlando: IEEE Computer Society, 2008. 39-44. [doi:10.1109/NPSEC.2008.4664879]
    • (2008) Proc. of the 4th Workshop on Secure Network Protocols (NPSec) , pp. 39-44
    • Yu, S.C.1    Ren, K.2    Lou, W.J.3
  • 11
    • 79959586617 scopus 로고    scopus 로고
    • Collusion-Resistant group key management using attribute-based encryption
    • Cheung L, Cooley J A, Khazan R, Newport C. Collusion-Resistant group key management using attribute-based encryption. http://eprint.iacr.org/2007/161.pdf
    • Cheung, L.1    Cooley, J.A.2    Khazan, R.3    Newport, C.4
  • 12
    • 75749102533 scopus 로고    scopus 로고
    • Attribute-Based on-demand multicast group setup with membership anonymity
    • [doi:10.1016/j.comnet.2009.09.009]
    • Yu S C, Ren K, Lou W J. Attribute-Based on-demand multicast group setup with membership anonymity. Computer Networks, 2010, 54(3): 377-386. [doi:10.1016/j.comnet.2009.09.009]
    • (2010) Computer Networks , vol.54 , Issue.3 , pp. 377-386
    • Yu, S.C.1    Ren, K.2    Lou, W.J.3
  • 14
    • 34548731375 scopus 로고    scopus 로고
    • Ciphertext-Policy attribute-based encryption
    • Washington: IEEE Computer Society, [doi:10.1109/SP.2007.11]
    • Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Proc. of the 2007 IEEE Symp. on Security and Privacy. Washington: IEEE Computer Society, 2007. 321-334. [doi:10.1109/SP.2007.11]
    • (2007) Proc. of the 2007 IEEE Symp. on Security and Privacy , pp. 321-334
    • Bethencourt, J.1    Sahai, A.2    Waters, B.3
  • 15
    • 0003745894 scopus 로고    scopus 로고
    • Secure schemes for secret sharing and key distribution
    • [Ph.D. Thesis]. Technion: Israel Institute of Technology
    • Beimel A. Secure schemes for secret sharing and key distribution [Ph.D. Thesis]. Technion: Israel Institute of Technology, 1996.
    • (1996)
    • Beimel, A.1
  • 16
    • 79959608304 scopus 로고    scopus 로고
    • Research on attribute-based cryptosystem
    • [MS. Thesis]. Shanghai: Shanghai Jiaotong University Press, (in Chinese)
    • Liang X H. Research on attribute-based cryptosystem [MS. Thesis]. Shanghai: Shanghai Jiaotong University Press, 2009 (in Chinese).
    • (2009)
    • Liang, X.H.1
  • 17
    • 77955211933 scopus 로고    scopus 로고
    • Revocation systems with very small private keys
    • Washington: IEEE Computer Society, [doi:10.1109/SP.2010.23]
    • Lewko A, Sahai A, Waters B. Revocation systems with very small private keys. In: Proc. of the IEEE Symp. on Security and Privacy. Washington: IEEE Computer Society, 2010. 273-285. [doi:10.1109/SP.2010.23]
    • (2010) Proc. of the IEEE Symp. on Security and Privacy , pp. 273-285
    • Lewko, A.1    Sahai, A.2    Waters, B.3
  • 18
    • 0018545449 scopus 로고
    • How to share a secret
    • [doi:10.1145/359168.359176]
    • Shamir A. How to share a secret. Communications of the ACM, 1979, 22(11): 612-613. [doi:10.1145/359168.359176]
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 21
    • 74049120601 scopus 로고    scopus 로고
    • Attribute-Based encryption with non-monotonic access structures
    • New York: ACM Press, [doi:10.1145/1315245.1315270]
    • Ostrovsky R, Sahai A, Waters B. Attribute-Based encryption with non-monotonic access structures. In: Proc. of the ACM Conf. on Computer and Communications Security. New York: ACM Press, 2007. 195-203. [doi:10.1145/1315245.1315270]
    • (2007) Proc. of the ACM Conf. on Computer and Communications Security , pp. 195-203
    • Ostrovsky, R.1    Sahai, A.2    Waters, B.3
  • 22
    • 84944319284 scopus 로고    scopus 로고
    • Efficient trace and revoke schemes
    • Frankel Y, ed. Berlin, Heidelberg: Springer-Verlag, [doi:10.1007/978-3-540-68914-0_7]
    • Naor M, Pinkas B. Efficient trace and revoke schemes. In: Frankel Y, ed. Proc. of the Financial Cryptography. Berlin, Heidelberg: Springer-Verlag, 2001. 1-20. [doi:10.1007/978-3-540-68914-0_7]
    • (2001) Proc. of the Financial Cryptography , pp. 1-20
    • Naor, M.1    Pinkas, B.2
  • 23
    • 45749094622 scopus 로고    scopus 로고
    • Attribute-Based encryption with partially hidden encryptor-specified access structures
    • Bellovin SM, Gennaro R, Keromytis A, Yung M, eds. Berlin, Heidelberg: Springer-Verlag, [doi:10.1007/978-3-540-68914-0_7]
    • Nishide T, Yoneyama K, Ohta K. Attribute-Based encryption with partially hidden encryptor-specified access structures. In: Bellovin SM, Gennaro R, Keromytis A, Yung M, eds. Proc. of the Applied Cryptography and Network Security. Berlin, Heidelberg: Springer-Verlag, 2008. 111-129. [doi:10.1007/978-3-540-68914-0_7]
    • (2008) Proc. of the Applied Cryptography and Network Security , pp. 111-129
    • Nishide, T.1    Yoneyama, K.2    Ohta, K.3
  • 24
    • 70350635850 scopus 로고    scopus 로고
    • A ciphertext-policy attribute-based encryption scheme with constant ciphertext length
    • Bao F, Li H, Wang G, eds. Berlin, Heidelberg: Springer-Verlag, [doi:10.1007/978-3-642-00843-6_2]
    • Emura K, Miyaji A, Nomura A, Omote K, Soshi M. A ciphertext-policy attribute-based encryption scheme with constant ciphertext length. In: Bao F, Li H, Wang G, eds. Proc. of the Information Security Practice and Experience (ISPEC 2009). Berlin, Heidelberg: Springer-Verlag, 2009. 13-23. [doi:10.1007/978-3-642-00843-6_2]
    • (2009) Proc. of the Information Security Practice and Experience (ISPEC 2009) , pp. 13-23
    • Emura, K.1    Miyaji, A.2    Nomura, A.3    Omote, K.4    Soshi, M.5
  • 25
    • 35048852705 scopus 로고    scopus 로고
    • Chosen-Ciphertext security from identity-based encryption
    • Berlin, Heidelberg: Springer-Verlag
    • Canetti R, Halevi S, Katz J. Chosen-Ciphertext security from identity-based encryption. In: Advances in Cryptology-EUROCRYPT 2004. Berlin, Heidelberg: Springer-Verlag, 2004. 207-222.
    • (2004) Advances in Cryptology-EUROCRYPT 2004 , pp. 207-222
    • Canetti, R.1    Halevi, S.2    Katz, J.3
  • 26
    • 38049045519 scopus 로고    scopus 로고
    • Conjunctive, subset, and range queries on encrypted data
    • Berlin, Heidelberg: Springer-Verlag, [doi:10.1007/978-3-540-70936-7_29]
    • Boneh D, Waters B. Conjunctive, subset, and range queries on encrypted data. In: Proc. of the Theory of Cryptography Conf. (TCC). Berlin, Heidelberg: Springer-Verlag, 2007. 535-554. [doi:10.1007/978-3-540-70936-7_29]
    • (2007) Proc. of the Theory of Cryptography Conf. (TCC) , pp. 535-554
    • Boneh, D.1    Waters, B.2
  • 27
    • 49049111604 scopus 로고    scopus 로고
    • Bounded ciphertext policy attribute based encryption
    • Aceto L, Damgård I, Goldberg LA, Halldórsson M M, Ingólfsdóttir A, Walukiewicz I, eds. Berlin, Heidelberg: Springer-Verlag, [doi:10.1007/978-3-540-70583-3_47]
    • Goyal V, Jain A, Pandey O, Sahai A. Bounded ciphertext policy attribute based encryption. In: Aceto L, Damgård I, Goldberg LA, Halldórsson M M, Ingólfsdóttir A, Walukiewicz I, eds. Proc. of the ICALP 2008. Berlin, Heidelberg: Springer-Verlag, 2008. 579-591. [doi:10.1007/978-3-540-70583-3_47]
    • (2008) Proc. of the ICALP 2008 , pp. 579-591
    • Goyal, V.1    Jain, A.2    Pandey, O.3    Sahai, A.4
  • 29
    • 70350630621 scopus 로고    scopus 로고
    • Efficient and provable secure ciphertext-policy attribute-based encryption schemes
    • Berlin, Heidelberg: Springer-Verlag, [doi:10.1007/978-3-642-00843-6_1]
    • Ibraimi L, Tang Q, Hartel P, Jonker W. Efficient and provable secure ciphertext-policy attribute-based encryption schemes. In: Proc. of the Information Security Practice and Experience. Berlin, Heidelberg: Springer-Verlag, 2009. 1-12. [doi:10.1007/978-3-642-00843-6_1]
    • (2009) Proc. of the Information Security Practice and Experience , pp. 1-12
    • Ibraimi, L.1    Tang, Q.2    Hartel, P.3    Jonker, W.4
  • 30
    • 79952521560 scopus 로고    scopus 로고
    • Ciphertext-Policy attribute-based encryption: An expressive, efficient, and provably secure realization
    • [doi:10.1007/978-3-642-19379-8_4]
    • Waters B. Ciphertext-Policy attribute-based encryption: An expressive, efficient, and provably secure realization. http://eprint.iacr.org/2008/290.pdf [doi:10.1007/978-3-642-19379-8_4]
    • Waters, B.1
  • 31
    • 69949143544 scopus 로고    scopus 로고
    • Conjunctive broadcast and attribute-based encryption
    • Shacham H, Waters B, eds. Berlin, Heidelberg: Springer-Verlag, [doi:10.1007/978-3-642-03298-1_16]
    • Attrapadung N, Imai H. Conjunctive broadcast and attribute-based encryption. In: Shacham H, Waters B, eds. Proc. of the Pairing-Based Cryptography-Pairing 2009. Berlin, Heidelberg: Springer-Verlag, 2009. 248-265. [doi:10.1007/978-3-642-03298-1_16]
    • (2009) Proc. of the Pairing-Based Cryptography-Pairing 2009 , pp. 248-265
    • Attrapadung, N.1    Imai, H.2
  • 32
    • 77954635558 scopus 로고    scopus 로고
    • Fully secure functional encryption: Attribute-Based encryption and (hierarchical) inner product encryption
    • LNCS 6110, Berlin, Heidelberg: Springer-Verlag, [doi:10.1007/978-3-642-13190-5_4]
    • Lewko A, Okamoto T, Sahai A, Takashima K, Waters B. Fully secure functional encryption: Attribute-Based encryption and (hierarchical) inner product encryption. In: Advances in Cryptology-EUROCRYPT 2010. LNCS 6110, Berlin, Heidelberg: Springer-Verlag, 2010. 62-91. [doi:10.1007/978-3-642-13190-5_4]
    • (2010) Cryptology-EUROCRYPT 2010
    • Lewko, A.1    Okamoto, T.2    Sahai, A.3    Takashima, K.4    Waters, B.5
  • 33
    • 70350345210 scopus 로고    scopus 로고
    • Dual system encryption: Realizing fully secure ibe and hibe under simple assumptions
    • Halevi S, ed. Berlin, Heidelberg: Springer-Verlag, [doi:10.1007/978-3-642-03356-8_36]
    • Waters B. Dual system encryption: Realizing fully secure ibe and hibe under simple assumptions. In: Halevi S, ed. Advances in Cryptology-CRYTO 2009. Berlin, Heidelberg: Springer-Verlag, 2009. 619-636. [doi:10.1007/978-3-642-03356-8_36]
    • (2009) Advances in Cryptology-CRYTO 2009 , pp. 619-636
    • Waters, B.1
  • 34
    • 77949581448 scopus 로고    scopus 로고
    • New techniques for dual system encryption and fully secure hibe with short ciphertexts
    • Berlin, Heidelberg: Springer-Verlag, [doi:10.1007/978-3-642-11799-2_27]
    • Lewko A, Waters B. New techniques for dual system encryption and fully secure hibe with short ciphertexts. In: Proc. of the 7th Theory of Cryptography Conf. (TCC 2010). Berlin, Heidelberg: Springer-Verlag, 2010. 455-479. [doi:10.1007/978-3-642-11799-2_27]
    • (2010) Proc. of the 7th Theory of Cryptography Conf. (TCC 2010) , pp. 455-479
    • Lewko, A.1    Waters, B.2
  • 35
    • 72449201970 scopus 로고    scopus 로고
    • Attribute-Based encryption supporting direct/indirect revocation modes
    • Parker MG, ed. Berlin, Heidelberg: Springer-Verlag, [doi:10.1007/978-3-642-10868-6_17]
    • Attrapadung N, Imai H. Attribute-Based encryption supporting direct/indirect revocation modes. In: Parker MG, ed. Proc. of the Cryptography and Coding 2009. Berlin, Heidelberg: Springer-Verlag, 2009. 278-300. [doi:10.1007/978-3-642-10868-6_17]
    • (2009) Proc. of the Cryptography and Coding 2009 , pp. 278-300
    • Attrapadung, N.1    Imai, H.2
  • 39
    • 79956000593 scopus 로고    scopus 로고
    • 2BE: Accountable attribute-based encryption for abuse free access control
    • 2BE: Accountable attribute-based encryption for abuse free access control. http://eprint.iacr.org/2009/118.pdf
    • Li, J.1    Ren, K.2    Kim, K.3
  • 40
    • 70350407157 scopus 로고    scopus 로고
    • Privacy-Aware attribute-based encryption with user accountability
    • LNCS 5735, Berlin, Heidelberg: Springer-Verlag, [doi:10.1007/978-3-642-04474-8_28]
    • Li J, Ren K, Zhu B, Wan Z G. Privacy-Aware attribute-based encryption with user accountability. In: Proc. of the Information Security Conf. 2009. LNCS 5735, Berlin, Heidelberg: Springer-Verlag, 2009. 347-362. [doi:10.1007/978-3-642-04474-8_28]
    • (2009) Proc. of the Information Security Conf. 2009 , pp. 347-362
    • Li, J.1    Ren, K.2    Zhu, B.3    Wan, Z.G.4
  • 41
    • 84885886363 scopus 로고    scopus 로고
    • Defending against key abuse attacks in KP-ABE enabled broadcast systems
    • Berlin, Heidelberg: Springer-Verlag, [doi:10.1007/978-3-642-05284-2_18]
    • Yu S C, Ren K, Lou W J, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Proc. of the Security and Privacy in Communication Networks. Berlin, Heidelberg: Springer-Verlag, 2009. 311-329. [doi:10.1007/978-3-642-05284-2_18]
    • (2009) Proc. of the Security and Privacy in Communication Network , pp. 311-329
    • Yu, S.C.1    Ren, K.2    Lou, W.J.3    Li, J.4
  • 42
    • 33746104815 scopus 로고    scopus 로고
    • Fully collusion resistant traitor tracing with short ciphertexts and private keys
    • Vaudenay S, ed. LNCS 4004, Berlin, Heidelberg: Springer-Verlag, [doi:10.1007/11761679_34]
    • Boneh D, Sahai A, Waters B. Fully collusion resistant traitor tracing with short ciphertexts and private keys. In: Vaudenay S, ed. Advances in Cryptology-EUROCRYPT 2006. LNCS 4004, Berlin, Heidelberg: Springer-Verlag, 2006. 573-592. [doi:10.1007/11761679_34]
    • (2006) Advances in Cryptology-EUROCRYPT 2006 , pp. 573-592
    • Boneh, D.1    Sahai, A.2    Waters, B.3
  • 43
    • 38049078557 scopus 로고    scopus 로고
    • Multi-Authority attribute based encryption
    • Berlin, Heidelberg: Springer-Verlag
    • Chase M. Multi-Authority attribute based encryption. In: Proc. of the Theory of Cryptography Conf. (TCC).Berlin, Heidelberg: Springer-Verlag, 2007. 515-534.
    • (2007) Proc. of the Theory of Cryptography Conf. (TCC) , pp. 515-534
    • Chase, M.1
  • 44
    • 82955217443 scopus 로고    scopus 로고
    • Multi-Authority attribute based encryption with honest-but-curious central authority
    • Božović V, Socek D, Steinwandt R, Villányi V I. Multi-Authority attribute based encryption with honest-but-curious central authority 2009. http://eprint.iacr.org/2009/083.pdf
    • (2009)
    • Božović, V.1    Socek, D.2    Steinwandt, R.3    Villányi, V.I.4
  • 45
    • 58749115565 scopus 로고    scopus 로고
    • Secure threshold multi authority attribute based encryption without a central authority
    • Chowdhury DR, Rijmen V, Das A, eds. Berlin, Heidelberg: Springer-Verlag, [doi:10.1007/978-3-540-89754-5_33]
    • Lin H, Cao Z F, Liang X, Shao J. Secure threshold multi authority attribute based encryption without a central authority. In: Chowdhury DR, Rijmen V, Das A, eds. Proc. of the Cryptology in India-INDOCRYPT 2008. Berlin, Heidelberg: Springer-Verlag, 2008. 426-436. [doi:10.1007/978-3-540-89754-5_33]
    • (2008) Proc. of the Cryptology in India-INDOCRYPT 2008 , pp. 426-436
    • Lin, H.1    Cao, Z.F.2    Liang, X.3    Shao, J.4
  • 46
    • 74049163235 scopus 로고    scopus 로고
    • Improving privacy and security in multi-authority attribute-based encryption
    • New York: ACM Press, [doi:10.1145/1653662.1653678]
    • Chase M, Chow S S M. Improving privacy and security in multi-authority attribute-based encryption. In: Proc. of the ACM Conf. on Computer and Communications Security. New York: ACM Press, 2009. 121-130. [doi:10.1145/1653662.1653678]
    • (2009) Proc. of the ACM Conf. on Computer and Communications Security , pp. 121-130
    • Chase, M.1    Chow, S.S.M.2
  • 47
    • 33846862213 scopus 로고    scopus 로고
    • Secure distributed key generation for discrete-log based cryptosystems
    • [doi:10.1007/s00145-006-0347-3]
    • Gennaro R, Jarecki S, Krawczyk H, Rabin T. Secure distributed key generation for discrete-log based cryptosystems. Journal of Cryptology, 2007, 20(1): 51-83. [doi:10.1007/s00145-006-0347-3]
    • (2007) Journal of Cryptology , vol.20 , Issue.1 , pp. 51-83
    • Gennaro, R.1    Jarecki, S.2    Krawczyk, H.3    Rabin, T.4
  • 50
    • 80053563168 scopus 로고    scopus 로고
    • Enhancing attribute-based encryption with attribute hierarchy
    • Berlin, Heidelberg: Springer-Verlag, [doi:10.1007/s11036-010-0233-y]
    • Li J, Wang Q, Wang C, Ren K. Enhancing attribute-based encryption with attribute hierarchy. In: Proc. of the Mobile Networks and Applications. Berlin, Heidelberg: Springer-Verlag, 2010. 1-9. [doi:10.1007/s11036-010-0233-y]
    • (2010) Proc. of the Mobile Networks and Applications , pp. 1-9
    • Li, J.1    Wang, Q.2    Wang, C.3    Ren, K.4
  • 51
    • 77954625601 scopus 로고    scopus 로고
    • Efficient lattice (H) IBE in the standard model
    • Gilbert H, ed. Berlin, Heidelberg: Springer-Verlag
    • Agrawal S, Boneh D, Boyen X. Efficient lattice (H) IBE in the standard model. In: Gilbert H, ed. Advances in Cryptology-EUROCRYPT 2010. Berlin, Heidelberg: Springer-Verlag, 2010. 553-572.
    • (2010) Advances in Cryptology-EUROCRYPT 2010 , pp. 553-572
    • Agrawal, S.1    Boneh, D.2    Boyen, X.3
  • 52
    • 24944562007 scopus 로고    scopus 로고
    • Hierarchical identity based encryption with constant size ciphertext
    • Cramer R, ed. Berlin, Heidelberg: Springer-Verlag, [doi:10.1007/11426639_26]
    • Boneh D, Boyen X, Goh E J. Hierarchical identity based encryption with constant size ciphertext. In: Cramer R, ed. Advances in Cryptology-EUROCRYPT 2005. Berlin, Heidelberg: Springer-Verlag, 2005. 440-456. [doi:10.1007/11426639_26]
    • (2005) Advances in Cryptology-EUROCRYPT 2005 , pp. 440-456
    • Boneh, D.1    Boyen, X.2    Goh, E.J.3
  • 53
    • 33749573228 scopus 로고    scopus 로고
    • Anonymous hierarchical identity-based encryption (without random oracles)
    • Dwork C, ed. Berlin, Heidelberg: Springer-Verlag, [doi:10.1007/11818175_17]
    • Boyen X, Waters B. Anonymous hierarchical identity-based encryption (without random oracles). In: Dwork C, ed. Advances in Cryptology-CRYPTO 2006. Berlin, Heidelberg: Springer-Verlag, 2006. 290-307. [doi:10.1007/11818175_17]
    • (2006) Advances in Cryptology-CRYPTO 2006 , pp. 290-307
    • Boyen, X.1    Waters, B.2
  • 55
    • 14844297376 scopus 로고    scopus 로고
    • Id-Based encryption for complex hierarchies with applications to forward security and broadcast encryption
    • New York: ACM Press, [doi:10.1145/1030083.1030130]
    • Yao D F, Fazio N, Dodis Y, Lysyanskaya A. Id-Based encryption for complex hierarchies with applications to forward security and broadcast encryption. In: Proc. of the ACM Conf. on Computer and Communications Security. New York: ACM Press, 2004. 354-363. [doi:10.1145/1030083.1030130]
    • (2004) Proc. of the ACM Conf. on Computer and Communications Security , pp. 354-363
    • Yao, D.F.1    Fazio, N.2    Dodis, Y.3    Lysyanskaya, A.4
  • 56
    • 68849097854 scopus 로고    scopus 로고
    • Dual-Policy attribute based encryption
    • Abdalla M, Pointcheval D, Fouque P A, Vergnaud D, eds. Berlin, Heidelberg: Springer-Verlag, [doi:10.1007/978-3-642-01957-9_11]
    • Attrapadung N, Imai H. Dual-Policy attribute based encryption. In: Abdalla M, Pointcheval D, Fouque P A, Vergnaud D, eds. Proc. of the Applied Cryptography and Network Security. Berlin, Heidelberg: Springer-Verlag, 2009. 168-185. [doi:10.1007/978-3-642-01957-9_11]
    • (2009) Proc. of the Applied Cryptography and Network Security , pp. 168-185
    • Attrapadung, N.1    Imai, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.