-
1
-
-
38049066685
-
Efficient Hybrid Encryption from Id-based Encryption
-
Abe, M., Cui, Y., Imai, H., Kiltz, E.: Efficient Hybrid Encryption from Id-based Encryption. Cryptology ePrint Archive, Report 2007/023 (2007)
-
(2007)
Cryptology ePrint Archive, Report 2007/023
-
-
Abe, M.1
Cui, Y.2
Imai, H.3
Kiltz, E.4
-
2
-
-
79952510987
-
Expressive Key-Policy Attribute- Based Encryption with Constant-Size Ciphertexts
-
Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. Springer, Heidelberg
-
Attrapadung, N., Libert, B., De Panafieu, E.: Expressive Key-Policy Attribute- Based Encryption with Constant-Size Ciphertexts. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 90-108. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6571
, pp. 90-108
-
-
Attrapadung, N.1
Libert, B.2
De Panafieu, E.3
-
3
-
-
79952511284
-
Functional Encryption for Inner Product: Achieving Constant-Size Ciphertexts with Adaptive Security or Support for Negation
-
Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. Springer, Heidelberg
-
Attrapadung, N., Libert, B.: Functional Encryption for Inner Product: Achieving Constant-Size Ciphertexts with Adaptive Security or Support for Negation. In: Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. LNCS, vol. 6056, pp. 384-402. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6056
, pp. 384-402
-
-
Attrapadung, N.1
Libert, B.2
-
4
-
-
34548731375
-
Ciphertext-Policy Attribute-Based Encryption
-
IEEE Press, Los Alamitos
-
Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-Policy Attribute-Based Encryption. In: 2007 IEEE Symposium on Security and Privacy, pp. 321-334. IEEE Press, Los Alamitos (2007)
-
(2007)
2007 IEEE Symposium on Security and Privacy
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
5
-
-
24944562007
-
Hierarchical identity based encryption with constant size ciphertext
-
Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
-
Boneh, D., Boyen, X., Goh, E.-J.: Hierarchical Identity Based Encryption with Constant Size Ciphertext. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 440-456. Springer, Heidelberg (2005) (Pubitemid 41313968)
-
(2005)
Lecture Notes in Computer Science
, vol.3494
, pp. 440-456
-
-
Boneh, D.1
Boyen, X.2
Goh, E.-J.3
-
6
-
-
33745767987
-
Direct Chosen Ciphertext Security from Identitybased Techniques
-
ACM Press, New York
-
Boyen, X., Mei, Q., Waters, B.: Direct Chosen Ciphertext Security from Identitybased Techniques. In: CCS 2005: 12th Conference on Computer and Communications Security, Alexandria, Virginia, USA, November 7-11, pp. 320-329. ACM Press, New York (2005)
-
(2005)
CCS 2005: 12th Conference on Computer and Communications Security, Alexandria, Virginia, USA, November 7-11
, pp. 320-329
-
-
Boyen, X.1
Mei, Q.2
Waters, B.3
-
7
-
-
74049163235
-
Improving Privacy and Security in Multi-Authority Attribute-Based Encryption
-
ACM, New York
-
Chase, M., Chow, S.S.M.: Improving Privacy and Security in Multi-Authority Attribute-Based Encryption. In: ACM Conference on Computer and Communication Security 2009, pp. 195-203. ACM, New York (2009)
-
(2009)
ACM Conference on Computer and Communication Security 2009
, pp. 195-203
-
-
Chase, M.1
Chow, S.S.M.2
-
8
-
-
38049078557
-
Multi-authority Attribute Based Encryption
-
Vadhan, S.P. (ed.) TCC 2007. Springer, Heidelberg
-
Chase, M.: Multi-authority Attribute Based Encryption. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 515-534. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4392
, pp. 515-534
-
-
Chase, M.1
-
9
-
-
35048852705
-
Chosen-Ciphertext Security from Identity-Based Encryption
-
Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. Springer, Heidelberg
-
Canetti, R., Halevi, S., Katz, J.: Chosen-Ciphertext Security from Identity-Based Encryption. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 207-222. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 207-222
-
-
Canetti, R.1
Halevi, S.2
Katz, J.3
-
11
-
-
70350635850
-
A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length
-
Bao, F., Li, H., Wang, G. (eds.) ISPEC 2009. Springer, Heidelberg
-
Emura, K., Miyaji, A., Nomura, A., Omote, K., Soshi, M.: A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length. In: Bao, F., Li, H., Wang, G. (eds.) ISPEC 2009. LNCS, vol. 5451, pp. 13-23. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5451
, pp. 13-23
-
-
Emura, K.1
Miyaji, A.2
Nomura, A.3
Omote, K.4
Soshi, M.5
-
12
-
-
84956859011
-
How to Enhance the Security of Public-Key Encryption at Minimum Cost
-
Imai, H., Zheng, Y. (eds.) PKC 1999. Springer, Heidelberg
-
Fujisaki, E., Okamoto, T.: How to Enhance the Security of Public-Key Encryption at Minimum Cost. In: Imai, H., Zheng, Y. (eds.) PKC 1999. LNCS, vol. 1560, pp. 53-68. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1560
, pp. 53-68
-
-
Fujisaki, E.1
Okamoto, T.2
-
13
-
-
49049111604
-
Bounded Ciphertext Policy Attribute Based Encryption
-
Aceto, L., Damgård, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) ICALP 2008, Part II. Springer, Heidelberg
-
Goyal, V., Jain, A., Pandey, O., Sahai, A.: Bounded Ciphertext Policy Attribute Based Encryption. In: Aceto, L., Damgård, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) ICALP 2008, Part II. LNCS, vol. 5126, pp. 579-591. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5126
, pp. 579-591
-
-
Goyal, V.1
Jain, A.2
Pandey, O.3
Sahai, A.4
-
14
-
-
34547273527
-
Attribute-based Encryption for Finegrained Access Control of Encrypted Data
-
ACM, New York
-
Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based Encryption for Finegrained Access Control of Encrypted Data. In: ACM Conference on Computer and Communication Security 2006, pp. 89-98. ACM, New York (2006)
-
(2006)
ACM Conference on Computer and Communication Security 2006
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
15
-
-
79952523217
-
Constant Size Ciphertexts in Threshold Attribute-Based Encryption
-
Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. Springer, Heidelberg
-
Herranz, J., Laguillaumie, F., Ràfols, C.: Constant Size Ciphertexts in Threshold Attribute-Based Encryption. In: Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. LNCS, vol. 6056, pp. 19-34. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6056
, pp. 19-34
-
-
Herranz, J.1
Laguillaumie, F.2
Ràfols, C.3
-
16
-
-
44449129423
-
Predicate encryption supporting disjunctions, polynomial equations, and inner products
-
DOI 10.1007/978-3-540-78967-3-9, Advances in Cryptology - EUROCRYPT 2008 - 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
-
Katz, J., Sahai, A., Waters, B.: Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 146-162. Springer, Heidelberg (2008) (Pubitemid 351762828)
-
(2008)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4965 LNCS
, pp. 146-162
-
-
Katz, J.1
Sahai, A.2
Waters, B.3
-
17
-
-
77952021770
-
Efficient CCA-Secure PKE from Identity- Based Techniques
-
Pieprzyk, J. (ed.) CT-RSA 2010. Springer, Heidelberg
-
Lai, J., Deng, R.H., Liu, S., Kou, W.: Efficient CCA-Secure PKE from Identity- Based Techniques. In: Pieprzyk, J. (ed.) CT-RSA 2010. LNCS, vol. 5985, pp. 132-147. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.5985
, pp. 132-147
-
-
Lai, J.1
Deng, R.H.2
Liu, S.3
Kou, W.4
-
18
-
-
77954635558
-
Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
-
Gilbert, H. (ed.) EUROCRYPT 2010. Springer, Heidelberg
-
Lewko, A., Okamoto, T., Sahai, A., Takashima, K., Waters, B.: Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 62-91. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6110
, pp. 62-91
-
-
Lewko, A.1
Okamoto, T.2
Sahai, A.3
Takashima, K.4
Waters, B.5
-
20
-
-
79957993008
-
Decentralizing Attribute-Based Encryption
-
Paterson, K.G. (ed.) EUROCRYPT 2011. Springer, Heidelberg
-
Lewko, A., Waters, B.: Decentralizing Attribute-Based Encryption. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 568-588. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6632
, pp. 568-588
-
-
Lewko, A.1
Waters, B.2
-
21
-
-
77957011503
-
Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption
-
Rabin, T. (ed.) CRYPTO 2010. Springer, Heidelberg
-
Okamoto, T., Takashima, K.: Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 191-208. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6223
, pp. 191-208
-
-
Okamoto, T.1
Takashima, K.2
-
22
-
-
74049120601
-
Attribute-based Encryption with Nonmonotonic Access Structures
-
ACM, New York
-
Ostrovsky, R., Sahai, A., Waters, B.: Attribute-based Encryption with Nonmonotonic Access Structures. In: ACM Conference on Computer and Communication Security 2007, pp. 195-203. ACM, New York (2007)
-
(2007)
ACM Conference on Computer and Communication Security 2007
, pp. 195-203
-
-
Ostrovsky, R.1
Sahai, A.2
Waters, B.3
-
23
-
-
24944554962
-
Fuzzy Identity-Based Encryption
-
Cramer, R. (ed.) EUROCRYPT 2005. Springer, Heidelberg
-
Sahai, A., Waters, B.: Fuzzy Identity-Based Encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457-473. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 457-473
-
-
Sahai, A.1
Waters, B.2
-
24
-
-
79952521560
-
Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization
-
Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. Springer, Heidelberg
-
Waters, B.: Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 90-107. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6571
, pp. 90-107
-
-
Waters, B.1
-
25
-
-
70350345210
-
Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
-
Halevi, S. (ed.) CRYPTO 2009. Springer, Heidelberg
-
Waters, B.: Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 619-636. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5677
, pp. 619-636
-
-
Waters, B.1
-
26
-
-
67650682832
-
Asymmetric Group Key Agreement
-
Joux, A. (ed.) EUROCRYPT 2009. Springer, Heidelberg
-
Wu, Q., Mu, Y., Susilo, W., Qin, B., Domingo-Ferrer, J.: Asymmetric Group Key Agreement. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 153-170. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5479
, pp. 153-170
-
-
Wu, Q.1
Mu, Y.2
Susilo, W.3
Qin, B.4
Domingo-Ferrer, J.5
-
27
-
-
79952493650
-
Generic Constructions for Chosen-Ciphertext Secure Attribute Based Encryption
-
Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. Springer, Heidelberg
-
Yamada, S., Attrapadung, N., Hanaoka, G., Kunihiro, N.: Generic Constructions for Chosen-Ciphertext Secure Attribute Based Encryption. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 90-107. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6571
, pp. 90-107
-
-
Yamada, S.1
Attrapadung, N.2
Hanaoka, G.3
Kunihiro, N.4
-
28
-
-
38049037296
-
Tweaking TBE/IBE to PKE Transforms with Chameleon Hash Functions
-
Katz, J., Yung, M. (eds.) ACNS 2007. Springer, Heidelberg
-
Zhang, R.: Tweaking TBE/IBE to PKE Transforms with Chameleon Hash Functions. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 323-339. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4521
, pp. 323-339
-
-
Zhang, R.1
-
29
-
-
80053164120
-
On Efficient Ciphertext-Policy Attribute Based Encryption and Broadcast Encryption
-
Zhou, Z., Huang, D.: On Efficient Ciphertext-Policy Attribute Based Encryption and Broadcast Encryption. Cryptology ePrint Archive, Report 2010/395 (2010)
-
(2010)
Cryptology ePrint Archive, Report 2010/395
-
-
Zhou, Z.1
Huang, D.2
|