-
1
-
-
79953232002
-
Identity-based encryption secure against selective opening attack
-
Ishai, Y. (ed.) TCC 2011 Springer, Heidelberg
-
Bellare, M., Waters, B., Yilek, S.: Identity-Based Encryption Secure against Selective Opening Attack. In: Ishai, Y. (ed.) TCC 2011. LNCS, vol. 6597, pp. 235-252. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6597
, pp. 235-252
-
-
Bellare, M.1
Waters, B.2
Yilek, S.3
-
2
-
-
34548731375
-
Ciphertext-policy attribute-based encryption IEEE
-
IEEE Computer Society
-
Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, pp. 321-334. IEEE Computer Society (2007)
-
(2007)
Symposium on Security and Privacy
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
5
-
-
21144456245
-
-
Franklin (ed.) [12]
-
Boneh, D., Boyen, X., Shacham, H.: Short group signatures. In: Franklin (ed.) [12], pp. 41-55
-
Short Group Signatures
, pp. 41-55
-
-
Boneh, D.1
Boyen, X.2
Shacham, H.3
-
6
-
-
17444370055
-
-
Cachin, Camenisch (eds.) [9]
-
Boneh, D., Crescenzo, G.D., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, Camenisch (eds.) [9], pp. 506-522
-
Public Key Encryption with Keyword Search
, pp. 506-522
-
-
Boneh, D.1
Crescenzo, G.D.2
Ostrovsky, R.3
Persiano, G.4
-
7
-
-
84874324906
-
Identity-based encryption from the weil pairing
-
Kilian, J. (ed.) CRYPTO 2001 Springer, Heidelberg
-
Boneh, D., Franklin, M.: Identity-Based Encryption from the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213-229. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
8
-
-
38049045519
-
Conjunctive, subset, and range queries on encrypted data
-
Vadhan, S.P. (ed.) TCC 2007 Springer, Heidelberg
-
Boneh, D., Waters, B.: Conjunctive, Subset, and Range Queries on Encrypted Data. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 535-554. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4392
, pp. 535-554
-
-
Boneh, D.1
Waters, B.2
-
9
-
-
84889576817
-
Eurocrypt 2004
-
Springer, Heidelberg
-
Cachin, C., Camenisch, J.L. (eds.): Eurocrypt 2004. LNCS, vol. 3027. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
-
-
Cachin, C.1
Camenisch, J.L.2
-
10
-
-
84855355935
-
Hidden vector encryption fully secure against unrestricted queries
-
Caro, A.D., Iovino, V., Persiano, G.: Hidden vector encryption fully secure against unrestricted queries. IACR Cryptologye Print Archive 2011, 546 (2011)
-
(2011)
IACR Cryptology EPrint Archive 2011
, pp. 546
-
-
Caro, A.D.1
Iovino, V.2
Persiano, G.3
-
11
-
-
77950151506
-
An identity based encryption scheme based on quadratic residues
-
Honary, B. (ed.) Cryptography and Coding 2001 Springer, Heidelberg
-
Cocks, C.: An Identity Based Encryption Scheme Based on Quadratic Residues. In: Honary, B. (ed.) Cryptography and Coding 2001. LNCS, vol. 2260, pp. 360-363. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2260
, pp. 360-363
-
-
Cocks, C.1
-
12
-
-
79959292842
-
Crypto 2004
-
Springer, Heidelberg
-
Franklin, M. (ed.): Crypto 2004. LNCS, vol. 3152. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3152
-
-
Franklin, M.1
-
13
-
-
34547273527
-
-
Juels, et al. (eds.) [14]
-
Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for finegrained access control of encrypted data. In: Juels, et al. (eds.) [14], pp. 89-98
-
Attribute-based Encryption for Finegrained Access Control of Encrypted Data
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
14
-
-
84859970952
-
-
Alexandria, VA, USA, October 30-November 3. ACM
-
Juels, A., Wright, R.N., di Vimercati, S.D.C. (eds.): Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, October 30-November 3. ACM (2006)
-
(2006)
Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006
-
-
Juels, A.1
Wright, R.N.2
Di Vimercati, S.D.C.3
-
15
-
-
44449129423
-
Predicate encryption supporting disjunctions, polynomial equations, and inner products
-
Smart, N.P. (ed.) EUROCRYPT 2008 Springer, Heidelberg
-
Katz, J., Sahai, A., Waters, B.: Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 146-162. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4965
, pp. 146-162
-
-
Katz, J.1
Sahai, A.2
Waters, B.3
-
16
-
-
77954635558
-
Fully secure functional encryption: Attribute-based encryption and (Hierarchical) inner product encryption
-
Gilbert, H. (ed.) EUROCRYPT 2010 Springer, Heidelberg
-
Lewko, A.B., Okamoto, T., Sahai, A., Takashima, K., Waters, B.: Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 62-91. Springer, Heidelberg (2010), http://eprint.iacr.org/2010/110
-
(2010)
LNCS
, vol.6110
, pp. 62-91
-
-
Lewko, A.B.1
Okamoto, T.2
Sahai, A.3
Takashima, K.4
Waters, B.5
-
17
-
-
52149087229
-
Homomorphic encryption and signatures from vector decomposition
-
Galbraith, S.D., Paterson, K.G. (eds.) Pairing 2008 Springer, Heidelberg
-
Okamoto, T., Takashima, K.: Homomorphic Encryption and Signatures from Vector Decomposition. In: Galbraith, S.D., Paterson, K.G. (eds.) Pairing 2008. LNCS, vol. 5209, pp. 57-74. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5209
, pp. 57-74
-
-
Okamoto, T.1
Takashima, K.2
-
18
-
-
72449208663
-
Hierarchical predicate encryption for inner-products
-
Matsui, M. (ed.) ASIACRYPT 2009 Springer, Heidelberg
-
Okamoto, T., Takashima, K.: Hierarchical Predicate Encryption for Inner-Products. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 214-231. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5912
, pp. 214-231
-
-
Okamoto, T.1
Takashima, K.2
-
19
-
-
77957011503
-
Fully secure functional encryption with general relations from the decisional linear assumption
-
Rabin, T. (ed.) CRYPTO 2010 Springer, Heidelberg
-
Okamoto, T., Takashima, K.: Fully secure functional encryption with general relations from the decisional linear assumption. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 191-208. Springer, Heidelberg (2010), http://eprint.iacr.org/2010/563
-
(2010)
LNCS
, vol.6223
, pp. 191-208
-
-
Okamoto, T.1
Takashima, K.2
-
20
-
-
83755161618
-
Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption
-
Lin, D., Tsudik, G., Wang, X. (eds.) CANS 2011 Springer, Heidelberg
-
Okamoto, T., Takashima, K.: Achieving Short Ciphertexts or Short Secret-Keys for Adaptively Secure General Inner-Product Encryption. In: Lin, D., Tsudik, G., Wang, X. (eds.) CANS 2011. LNCS, vol. 7092, pp. 138-159. Springer, Heidelberg (2011), http://eprint.iacr.org/2011/648
-
(2011)
LNCS
, vol.7092
, pp. 138-159
-
-
Okamoto, T.1
Takashima, K.2
-
21
-
-
84859954812
-
Adaptively attribute-hiding (hierarchical) inner product encryption
-
the full version of this paper
-
Okamoto, T., Takashima, K.: Adaptively attribute-hiding (hierarchical) inner product encryption. IACR Cryptology ePrint Archive 2011, 543 (2011), the full version of this paper, http://eprint.iacr.org/2011/543
-
(2011)
IACR Cryptology EPrint Archive 2011
, vol.543
-
-
Okamoto, T.1
Takashima, K.2
-
22
-
-
74049120601
-
Attribute-based encryption with nonmonotonic access structures
-
Ning, P., di Vimercati, S.D.C., Syverson, P.F. (eds.) ACM
-
Ostrovsky, R., Sahai, A., Waters, B.: Attribute-based encryption with nonmonotonic access structures. In: Ning, P., di Vimercati, S.D.C., Syverson, P.F. (eds.) ACM Conference on Computer and Communications Security, pp. 195-203. ACM (2007)
-
(2007)
ACM Conference on Computer and Communications Security
, pp. 195-203
-
-
Ostrovsky, R.1
Sahai, A.2
Waters, B.3
-
23
-
-
34547325357
-
-
Juels, V., et al. (eds.) [14]
-
Pirretti, M., Traynor, P., McDaniel, P.,Waters, B.: Secure attribute-based systems. In: Juels, V., et al. (eds.) [14], pp. 99-112
-
Secure Attribute-based Systems
, pp. 99-112
-
-
Pirretti, M.1
Traynor, P.2
McDaniel, P.3
Waters, B.4
-
24
-
-
24944554962
-
Fuzzy identity-based encryption
-
Cramer, R. (ed.), EUROCRYPT 2005 Springer, Heidelberg
-
Sahai, A., Waters, B.: Fuzzy Identity-Based Encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457-473. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 457-473
-
-
Sahai, A.1
Waters, B.2
-
25
-
-
70350345210
-
Dual system encryption: Realizing fully secure ibe and hibe under simple assumptions
-
Halevi, S. (ed.) CRYPTO 2009 Springer, Heidelberg
-
Waters, B.: Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 619-636. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5677
, pp. 619-636
-
-
Waters, B.1
|