메뉴 건너뛰기




Volumn 7237 LNCS, Issue , 2012, Pages 591-608

Adaptively attribute-hiding (hierarchical) inner product encryption

Author keywords

[No Author keywords available]

Indexed keywords

CIPHERTEXTS; COMPUTATIONAL REDUCTION; DUAL SYSTEM; ENCRYPTION TECHNIQUE; INNER PRODUCT; NEW FORMS; SECRET KEY; THE STANDARD MODEL;

EID: 84860009960     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-29011-4_35     Document Type: Conference Paper
Times cited : (145)

References (25)
  • 1
    • 79953232002 scopus 로고    scopus 로고
    • Identity-based encryption secure against selective opening attack
    • Ishai, Y. (ed.) TCC 2011 Springer, Heidelberg
    • Bellare, M., Waters, B., Yilek, S.: Identity-Based Encryption Secure against Selective Opening Attack. In: Ishai, Y. (ed.) TCC 2011. LNCS, vol. 6597, pp. 235-252. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6597 , pp. 235-252
    • Bellare, M.1    Waters, B.2    Yilek, S.3
  • 2
    • 34548731375 scopus 로고    scopus 로고
    • Ciphertext-policy attribute-based encryption IEEE
    • IEEE Computer Society
    • Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, pp. 321-334. IEEE Computer Society (2007)
    • (2007) Symposium on Security and Privacy , pp. 321-334
    • Bethencourt, J.1    Sahai, A.2    Waters, B.3
  • 7
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • Kilian, J. (ed.) CRYPTO 2001 Springer, Heidelberg
    • Boneh, D., Franklin, M.: Identity-Based Encryption from the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213-229. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 8
    • 38049045519 scopus 로고    scopus 로고
    • Conjunctive, subset, and range queries on encrypted data
    • Vadhan, S.P. (ed.) TCC 2007 Springer, Heidelberg
    • Boneh, D., Waters, B.: Conjunctive, Subset, and Range Queries on Encrypted Data. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 535-554. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4392 , pp. 535-554
    • Boneh, D.1    Waters, B.2
  • 9
    • 84889576817 scopus 로고    scopus 로고
    • Eurocrypt 2004
    • Springer, Heidelberg
    • Cachin, C., Camenisch, J.L. (eds.): Eurocrypt 2004. LNCS, vol. 3027. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027
    • Cachin, C.1    Camenisch, J.L.2
  • 11
    • 77950151506 scopus 로고    scopus 로고
    • An identity based encryption scheme based on quadratic residues
    • Honary, B. (ed.) Cryptography and Coding 2001 Springer, Heidelberg
    • Cocks, C.: An Identity Based Encryption Scheme Based on Quadratic Residues. In: Honary, B. (ed.) Cryptography and Coding 2001. LNCS, vol. 2260, pp. 360-363. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2260 , pp. 360-363
    • Cocks, C.1
  • 12
    • 79959292842 scopus 로고    scopus 로고
    • Crypto 2004
    • Springer, Heidelberg
    • Franklin, M. (ed.): Crypto 2004. LNCS, vol. 3152. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3152
    • Franklin, M.1
  • 15
    • 44449129423 scopus 로고    scopus 로고
    • Predicate encryption supporting disjunctions, polynomial equations, and inner products
    • Smart, N.P. (ed.) EUROCRYPT 2008 Springer, Heidelberg
    • Katz, J., Sahai, A., Waters, B.: Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 146-162. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4965 , pp. 146-162
    • Katz, J.1    Sahai, A.2    Waters, B.3
  • 16
    • 77954635558 scopus 로고    scopus 로고
    • Fully secure functional encryption: Attribute-based encryption and (Hierarchical) inner product encryption
    • Gilbert, H. (ed.) EUROCRYPT 2010 Springer, Heidelberg
    • Lewko, A.B., Okamoto, T., Sahai, A., Takashima, K., Waters, B.: Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 62-91. Springer, Heidelberg (2010), http://eprint.iacr.org/2010/110
    • (2010) LNCS , vol.6110 , pp. 62-91
    • Lewko, A.B.1    Okamoto, T.2    Sahai, A.3    Takashima, K.4    Waters, B.5
  • 17
    • 52149087229 scopus 로고    scopus 로고
    • Homomorphic encryption and signatures from vector decomposition
    • Galbraith, S.D., Paterson, K.G. (eds.) Pairing 2008 Springer, Heidelberg
    • Okamoto, T., Takashima, K.: Homomorphic Encryption and Signatures from Vector Decomposition. In: Galbraith, S.D., Paterson, K.G. (eds.) Pairing 2008. LNCS, vol. 5209, pp. 57-74. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5209 , pp. 57-74
    • Okamoto, T.1    Takashima, K.2
  • 18
    • 72449208663 scopus 로고    scopus 로고
    • Hierarchical predicate encryption for inner-products
    • Matsui, M. (ed.) ASIACRYPT 2009 Springer, Heidelberg
    • Okamoto, T., Takashima, K.: Hierarchical Predicate Encryption for Inner-Products. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 214-231. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5912 , pp. 214-231
    • Okamoto, T.1    Takashima, K.2
  • 19
    • 77957011503 scopus 로고    scopus 로고
    • Fully secure functional encryption with general relations from the decisional linear assumption
    • Rabin, T. (ed.) CRYPTO 2010 Springer, Heidelberg
    • Okamoto, T., Takashima, K.: Fully secure functional encryption with general relations from the decisional linear assumption. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 191-208. Springer, Heidelberg (2010), http://eprint.iacr.org/2010/563
    • (2010) LNCS , vol.6223 , pp. 191-208
    • Okamoto, T.1    Takashima, K.2
  • 20
    • 83755161618 scopus 로고    scopus 로고
    • Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption
    • Lin, D., Tsudik, G., Wang, X. (eds.) CANS 2011 Springer, Heidelberg
    • Okamoto, T., Takashima, K.: Achieving Short Ciphertexts or Short Secret-Keys for Adaptively Secure General Inner-Product Encryption. In: Lin, D., Tsudik, G., Wang, X. (eds.) CANS 2011. LNCS, vol. 7092, pp. 138-159. Springer, Heidelberg (2011), http://eprint.iacr.org/2011/648
    • (2011) LNCS , vol.7092 , pp. 138-159
    • Okamoto, T.1    Takashima, K.2
  • 21
    • 84859954812 scopus 로고    scopus 로고
    • Adaptively attribute-hiding (hierarchical) inner product encryption
    • the full version of this paper
    • Okamoto, T., Takashima, K.: Adaptively attribute-hiding (hierarchical) inner product encryption. IACR Cryptology ePrint Archive 2011, 543 (2011), the full version of this paper, http://eprint.iacr.org/2011/543
    • (2011) IACR Cryptology EPrint Archive 2011 , vol.543
    • Okamoto, T.1    Takashima, K.2
  • 22
    • 74049120601 scopus 로고    scopus 로고
    • Attribute-based encryption with nonmonotonic access structures
    • Ning, P., di Vimercati, S.D.C., Syverson, P.F. (eds.) ACM
    • Ostrovsky, R., Sahai, A., Waters, B.: Attribute-based encryption with nonmonotonic access structures. In: Ning, P., di Vimercati, S.D.C., Syverson, P.F. (eds.) ACM Conference on Computer and Communications Security, pp. 195-203. ACM (2007)
    • (2007) ACM Conference on Computer and Communications Security , pp. 195-203
    • Ostrovsky, R.1    Sahai, A.2    Waters, B.3
  • 24
    • 24944554962 scopus 로고    scopus 로고
    • Fuzzy identity-based encryption
    • Cramer, R. (ed.), EUROCRYPT 2005 Springer, Heidelberg
    • Sahai, A., Waters, B.: Fuzzy Identity-Based Encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457-473. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3494 , pp. 457-473
    • Sahai, A.1    Waters, B.2
  • 25
    • 70350345210 scopus 로고    scopus 로고
    • Dual system encryption: Realizing fully secure ibe and hibe under simple assumptions
    • Halevi, S. (ed.) CRYPTO 2009 Springer, Heidelberg
    • Waters, B.: Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 619-636. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5677 , pp. 619-636
    • Waters, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.