-
2
-
-
34548731375
-
Ciphertext-policy attribute-based encryption
-
may
-
J. Bethencourt, A. Sahai, and B. Waters, "Ciphertext-policy attribute-based encryption," in IEEE Symposium on Security and Privacy, may 2007, pp. 321-334.
-
(2007)
IEEE Symposium on Security and Privacy
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
3
-
-
79952521560
-
Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization
-
B. Waters, "Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization," Public Key Cryptography- PKC 2011, pp. 53-70, 2011.
-
(2011)
Public Key Cryptography- PKC 2011, Pp
, pp. 53-70
-
-
Waters, B.1
-
4
-
-
49049111604
-
Bounded ciphertext policy attribute based encryption
-
V. Goyal, A. Jain, O. Pandey, and A. Sahai, "Bounded ciphertext policy attribute based encryption," Automata, Languages and Programming, pp. 579-591, 2008.
-
(2008)
Automata, Languages and Programming, Pp
, pp. 579-591
-
-
Goyal, V.1
Jain, A.2
Pandey, O.3
Sahai, A.4
-
5
-
-
74049120601
-
Attribute-based encryption with non-monotonic access structures
-
ACM
-
R. Ostrovsky, A. Sahai, and B. Waters, "Attribute-based encryption with non-monotonic access structures," in Proceedings of the 14th ACM conference on Computer and communications security. ACM, 2007, pp. 195-203.
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security
, pp. 195-203
-
-
Ostrovsky, R.1
Sahai, A.2
Waters, B.3
-
6
-
-
77954635558
-
Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption
-
A. Lewko, T. Okamoto, A. Sahai, K. Takashima, and B. Waters, "Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption," Advances in Cryptology-EUROCRYPT 2010, pp. 62-91, 2010.
-
(2010)
Advances in Cryptology-EUROCRYPT 2010, Pp
, pp. 62-91
-
-
Lewko, A.1
Okamoto, T.2
Sahai, A.3
Takashima, K.4
Waters, B.5
-
7
-
-
38049078557
-
Multi-authority attribute based encryption
-
M. Chase, "Multi-authority attribute based encryption," Theory of Cryptography, vol. 4392, pp. 515-534, 2007.
-
(2007)
Theory of Cryptography
, vol.4392
, pp. 515-534
-
-
Chase, M.1
-
8
-
-
67049156803
-
Distributed attribute-based encryption
-
S. Müller, S. Katzenbeisser, and C. Eckert, "Distributed attribute-based encryption," Information Security and Cryptology, pp. 20-36, 2009.
-
(2009)
Information Security and Cryptology, Pp
, pp. 20-36
-
-
Müller, S.1
Katzenbeisser, S.2
Eckert, C.3
-
11
-
-
77954471010
-
Attribute based data sharing with attribute revocation
-
ACM
-
S. Yu, C. Wang, K. Ren, and W. Lou, "Attribute based data sharing with attribute revocation," in Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security. ACM, 2010, pp. 261-270.
-
(2010)
Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
, pp. 261-270
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
-
13
-
-
79956030125
-
Easier: Encryption-based access control in social networks with efficient revocation
-
ACM
-
S. Jahid, P. Mittal, and N. Borisov, "Easier: encryption-based access control in social networks with efficient revocation," in Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security. ACM, 2011, pp. 411-415.
-
(2011)
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
, pp. 411-415
-
-
Jahid, S.1
Mittal, P.2
Borisov, N.3
-
14
-
-
85033460636
-
Plutus: Scalable secure file sharing on untrusted storage
-
Berkeley, CA, USA: USENIX Association
-
M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu, "Plutus: Scalable secure file sharing on untrusted storage," in Proceedings of the 2nd USENIX Conference on File and Storage Technologies. Berkeley, CA, USA: USENIX Association, 2003, pp. 29-42.
-
(2003)
Proceedings of the 2nd USENIX Conference on File and Storage Technologies
, pp. 29-42
-
-
Kallahalla, M.1
Riedel, E.2
Swaminathan, R.3
Wang, Q.4
Fu, K.5
-
15
-
-
85033498470
-
SiRiUS: Securing remote untrusted storage
-
Citeseer
-
E. Goh, H. Shacham, N. Modadugu, and D. Boneh, "SiRiUS: Securing remote untrusted storage," in Proceedings of the Tenth Network and Distributed System Security (NDSS) Symposium. Citeseer, 2003, pp. 131-145.
-
(2003)
Proceedings of the Tenth Network and Distributed System Security (NDSS) Symposium
, pp. 131-145
-
-
Goh, E.1
Shacham, H.2
Modadugu, N.3
Boneh, D.4
-
16
-
-
84880852861
-
Revocation and tracing schemes for stateless receivers
-
Springer
-
D. Naor, M. Naor, and J. Lotspiech, "Revocation and tracing schemes for stateless receivers," in Advances in Cryptology-CRYPTO 2001. Springer, 2001, pp. 41-62.
-
(2001)
Advances in Cryptology-CRYPTO 2001
, pp. 41-62
-
-
Naor, D.1
Naor, M.2
Lotspiech, J.3
-
17
-
-
0034216176
-
Minimizing number of wavelengths in multicast routing trees in wdm networks
-
D. Li, X. Du, X. Hu, L. Ruan, and X. Jia, "Minimizing number of wavelengths in multicast routing trees in wdm networks," Networks, vol. 35, no. 4, pp. 260-265, 2000.
-
(2000)
Networks
, vol.35
, Issue.4
, pp. 260-265
-
-
Li, D.1
Du, X.2
Hu, X.3
Ruan, L.4
Jia, X.5
-
18
-
-
85011043313
-
Over-encryption: Management of access control evolution on outsourced data
-
VLDB Endowment
-
S. Di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati, "Over-encryption: management of access control evolution on outsourced data," in Proceedings of the 33rd international conference on Very large data bases. VLDB Endowment, 2007, pp. 123-134.
-
(2007)
Proceedings of the 33rd International Conference on Very Large Data Bases
, pp. 123-134
-
-
Di Vimercati, S.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
19
-
-
70349303408
-
A data outsourcing architecture combining cryptography and access control
-
New York, NY, USA: ACM
-
S. D. C. di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati, "A data outsourcing architecture combining cryptography and access control," in Proceedings of the 2007 ACM workshop on Computer security architecture, ser. CSAW '07. New York, NY, USA: ACM, 2007, pp. 63-69.
-
(2007)
Proceedings of the 2007 ACM Workshop on Computer Security Architecture, ser. CSAW '07
, pp. 63-69
-
-
Di Vimercati, S.D.C.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
20
-
-
74049154660
-
Secure and efficient access to outsourced data
-
ACM
-
W. Wang, Z. Li, R. Owens, and B. Bhargava, "Secure and efficient access to outsourced data," in Proceedings of the 2009 ACM workshop on Cloud computing security. ACM, 2009, pp. 55-66.
-
(2009)
Proceedings of the 2009 ACM Workshop on Cloud Computing Security
, pp. 55-66
-
-
Wang, W.1
Li, Z.2
Owens, R.3
Bhargava, B.4
-
22
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
ACM
-
V. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attribute-based encryption for fine-grained access control of encrypted data," in Proceedings of the 13th ACM conference on Computer and communications security. ACM, 2006, pp. 89-98.
-
(2006)
Proceedings of the 13th ACM Conference on Computer and Communications Security
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
23
-
-
77953310709
-
Achieving secure, scalable, and fine-grained data access control in cloud computing
-
IEEE Press
-
S. Yu, C. Wang, K. Ren, and W. Lou, "Achieving secure, scalable, and fine-grained data access control in cloud computing," in Proceedings of the 29th conference on Information communications. IEEE Press, 2010, pp. 534-542.
-
(2010)
Proceedings of the 29th Conference on Information Communications
, pp. 534-542
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
-
24
-
-
77950867637
-
Secure threshold multi authority attribute based encryption without a central authority
-
H. Lin, Z. Cao, X. Liang, and J. Shao, "Secure threshold multi authority attribute based encryption without a central authority," Information Sciences, vol. 180, no. 13, pp. 2618-2632, 2010.
-
(2010)
Information Sciences
, vol.180
, Issue.13
, pp. 2618-2632
-
-
Lin, H.1
Cao, Z.2
Liang, X.3
Shao, J.4
-
25
-
-
84988273293
-
Multi-authority ciphertext-policy attribute-based encryption with accountability
-
New York, NY, USA: ACM
-
J. Li, Q. Huang, X. Chen, S. S. M. Chow, D. S. Wong, and D. Xie, "Multi-authority ciphertext-policy attribute-based encryption with accountability," in Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ser. ASIACCS '11. New York, NY, USA: ACM, 2011, pp. 386-390.
-
(2011)
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ser. ASIACCS '11
, pp. 386-390
-
-
Li, J.1
Huang, Q.2
Chen, X.3
Chow, S.S.M.4
Wong, D.S.5
Xie, D.6
-
26
-
-
34547325357
-
Secure attribute-based systems
-
ACM
-
M. Pirretti, P. Traynor, P. McDaniel, and B. Waters, "Secure attribute-based systems," in Proceedings of the 13th ACM conference on Computer and communications security. ACM, 2006, pp. 99-112.
-
(2006)
Proceedings of the 13th ACM Conference on Computer and Communications Security
, pp. 99-112
-
-
Pirretti, M.1
Traynor, P.2
McDaniel, P.3
Waters, B.4
-
27
-
-
79957599737
-
Ciphertext policy attribute based encryption with efficient revocation
-
University of Waterloo
-
X. Liang, R. Lu, and X. Lin, "Ciphertext policy attribute based encryption with efficient revocation," University of Waterloo, Tech. Rep., 2011.
-
(2011)
Tech. Rep.
-
-
Liang, X.1
Lu, R.2
Lin, X.3
-
29
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Springer
-
A. Shamir, "Identity-based cryptosystems and signature schemes," in Advances in cryptology. Springer, 1985, pp. 47-53.
-
(1985)
Advances in Cryptology
, pp. 47-53
-
-
Shamir, A.1
-
30
-
-
84874324906
-
Identity-based encryption from the weil pairing
-
Springer
-
D. Boneh and M. Franklin, "Identity-based encryption from the weil pairing," in Advances in Cryptology-CRYPTO 2001. Springer, 2001, pp. 213-229.
-
(2001)
Advances in Cryptology-CRYPTO 2001
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
31
-
-
77950151506
-
An identity based encryption scheme based on quadratic residues
-
C. Cocks, "An identity based encryption scheme based on quadratic residues," Cryptography and Coding, pp. 360-363, 2001.
-
(2001)
Cryptography and Coding
, pp. 360-363
-
-
Cocks, C.1
|