-
1
-
-
0028514601
-
Kerberos: An authentication sewice for computer networks
-
Sept.
-
B.C. Neuman and T. Ts'o, "Kerberos: An Authentication Sewice for Computer Networks," IEEE Comm. Magazine, vol. 32, no. 9, pp. 33-38, Sept. 1994.
-
(1994)
IEEE Comm. Magazine
, vol.32
, Issue.9
, pp. 33-38
-
-
Neuman, B.C.1
Ts'O, T.2
-
3
-
-
34548731375
-
Ciphertext-policy attribute-based encryption
-
DOI 10.1109/SP.2007.11, 4223236, Proceedings - S and P 2007: 2007 IEEE Symposium on Security and Privacy, SP'07
-
J. Bethencourt, A. Sahai, and B. Waters, "Ciphertext-Policy Attribute-Based Encryption," Proc. IEEE Symp. Security and Privacy (S&P '07), pp. 321-34, May 2007. (Pubitemid 47432538)
-
(2007)
Proceedings - IEEE Symposium on Security and Privacy
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
4
-
-
24944554962
-
Fuzzy identity-based encryption
-
Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
-
A. Sahai and B. Waters, "Fuzzy Identity-Based Encryption," EUROCRYPT '05: Proc. Advances in Cryptology, R. Cramer, ed., pp. 457-473, May 2005. (Pubitemid 41313969)
-
(2005)
Lecture Notes in Computer Science
, vol.3494
, pp. 457-473
-
-
Sahai, A.1
Waters, B.2
-
5
-
-
38049078557
-
Multi-authority attribute based encryption
-
S.P. Vadhan, ed. Feb.
-
M. Chase, "Multi-Authority Attribute Based Encryption," Proc. Theory of Cryptography Conf. (TCC '07), S.P. Vadhan, ed., pp. 515-534, Feb. 2007.
-
(2007)
Proc. Theory of Cryptography Conf. (TCC '07)
, pp. 515-534
-
-
Chase, M.1
-
6
-
-
67049156803
-
Distributed attribute-based encryption
-
P.J. Lee and J.H. Cheon, eds. Dec.
-
S. Mü ller, S. Katzenbeisser, and C. Eckert, "Distributed Attribute-Based Encryption," Proc. 11th Int'l Conf. Information Security and Cryptology (ICISC '08), P.J. Lee and J.H. Cheon, eds., pp. 20-36, Dec. 2008.
-
(2008)
Proc. 11th Int'l Conf. Information Security and Cryptology (ICISC '08)
, pp. 20-36
-
-
Müller, S.1
Katzenbeisser, S.2
Eckert, C.3
-
7
-
-
58749115565
-
Secure threshold multi-authority attribute based encryption without a central authority
-
D.R. Chowdhury V. Rijmen, and A. Das, eds. Dec.
-
H. Lin, Z. Cao, X. Liang, and J. Shao, "Secure Threshold Multi-Authority Attribute Based Encryption without a Central Authority," INDOCRYPT '08: Proc. Int'l Conf. Cryptology in India, D.R. Chowdhury, V. Rijmen, and A. Das, eds., pp. 426-436, Dec. 2008.
-
(2008)
INDOCRYPT '08: Proc. Int'l Conf. Cryptology in India
, pp. 426-436
-
-
Lin, H.1
Cao, Z.2
Liang, X.3
Shao, J.4
-
8
-
-
79957993008
-
Decentralizing attribute-based encryption
-
K.G. Paterson, ed. May
-
A. Lewko and B. Waters, "Decentralizing Attribute-Based Encryption," EUROCRYPT '11: Proc. 30th Ann. Int'l Conf. Theory and Applications of Cryptographic Techniques: Advances in Cryptology, K.G. Paterson, ed., pp. 568-588, May 2011.
-
(2011)
EUROCRYPT '11: Proc. 30th Ann. Int'l Conf. Theory and Applications of Cryptographic Techniques: Advances in Cryptology
, pp. 568-588
-
-
Lewko, A.1
Waters, B.2
-
9
-
-
84988273293
-
Multi-authority ciphertext-policy attribute-based encryption with accountability
-
J. Li, Q. Huang, X. Chen, S.S.M. Chow, D.S. Wong, and D. Xie, "Multi-Authority Ciphertext-Policy Attribute-Based Encryption with Accountability," Proc. ACM Symp. Information, Computer and Comm. Security (ASIACCS '11), pp. 386-390, 2011.
-
(2011)
Proc. ACM Symp. Information, Computer and Comm. Security (ASIACCS '11)
, pp. 386-390
-
-
Li, J.1
Huang, Q.2
Chen, X.3
Chow, S.S.M.4
Wong, D.S.5
Xie, D.6
-
10
-
-
84874324906
-
Identity-based encryption from the weil pairing
-
Advances in Cryptology - CRYPTO 2001
-
D. Boneh and M.K. Franklin, "Identity-Based Encryption from the Weil Pairing," CRYPTO '01: Proc. Advances in Cryptology, J. Kilian, ed., pp. 213-229, Aug. 2001. (Pubitemid 33317917)
-
(2001)
Lecture Notes in Computer Science
, Issue.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
11
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
G.R. Blakley and D. Chaum, eds. Aug.
-
A. Shamir, "Identity-Based Cryptosystems and Signature Schemes," CRYPTO '84: Proc. Advances in Cryptology, G.R. Blakley and D. Chaum, eds., pp. 47-53, Aug. 1985.
-
(1985)
CRYPTO '84: Proc. Advances in Cryptology
, pp. 47-53
-
-
Shamir, A.1
-
12
-
-
33746062799
-
Practical identity-based encryption without random oracles
-
DOI 10.1007/11761679-27, Advances in Cryptology - EUROCRYPT 2006 - 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
-
C. Gentry, "Practical Identity-Based Encryption without Random Oracles," EUROCRYPT '06: Proc. Advances in Cryptology, S. Vaudenay, ed., pp. 445-464, May/June 2006. (Pubitemid 44072255)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4004
, pp. 445-464
-
-
Gentry, C.1
-
13
-
-
24944566040
-
Efficient Identity-Based Encryption without random oracles
-
Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
-
B. Waters, "Efficient Identity-Based Encryption without Random Oracles," EUROCRYPT '05: Proc. Advances in Cryptology, R. Cramer, ed., pp. 114-127, May 2005. (Pubitemid 41313949)
-
(2005)
Lecture Notes in Computer Science
, vol.3494
, pp. 114-127
-
-
Waters, B.1
-
14
-
-
35048841300
-
Efficient selective-id secure identity-based encryption without random oracles
-
C. Cachin and J. Camenisch, eds. May
-
D. Boneh and X. Boyen, "Efficient Selective-Id Secure Identity-Based Encryption without Random Oracles," EUROCRYP '04: Proc. Advances in Cryptology, C. Cachin and J. Camenisch, eds., pp. 223-238, May 2004.
-
(2004)
EUROCRYP '04: Proc. Advances in Cryptology
, pp. 223-238
-
-
Boneh, D.1
Boyen, X.2
-
15
-
-
74049163235
-
Improving privacy and security in multi-authority attribute-based encryption
-
E. Al-Shaer, S. Jha, and A.D. Keromytis, eds. Nov.
-
M. Chase and S.S. Chow, "Improving Privacy and Security in Multi-Authority Attribute-Based Encryption," Proc. ACM Conf. Computer and Comm. Security (CCS '09), E. Al-Shaer, S. Jha, and A.D. Keromytis, eds., pp. 121-130, Nov. 2009.
-
(2009)
Proc. ACM Conf. Computer and Comm. Security (CCS '09)
, pp. 121-130
-
-
Chase, M.1
Chow, S.S.2
-
16
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
DOI 10.1145/1180405.1180418, 1180418, CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security
-
V. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data," Proc. ACM Conf. Computer and Comm. Security (CCS '06), A. Juels, R.N. Wright, and S.D.C. di Vimercati, eds., pp. 89-98, Oct./Nov. 2006. (Pubitemid 47131359)
-
(2006)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
17
-
-
74049120601
-
Attribute-based encryption with non-monotonic access structures
-
P. Ning, S.D.C. di Vimercati, and P.F. Syverson, eds. Oct.
-
R. Ostrovsky, A. Sahai, and B. Waters, "Attribute-Based Encryption with Non-Monotonic Access Structures," Proc. ACM Conf. Computer and Comm. Security (CCS '07), P. Ning, S.D.C. di Vimercati, and P.F. Syverson, eds., pp. 195-203, Oct. 2007.
-
(2007)
Proc. ACM Conf. Computer and Comm. Security (CCS '07)
, pp. 195-203
-
-
Ostrovsky, R.1
Sahai, A.2
Waters, B.3
-
18
-
-
45749116552
-
Provably secure ciphertext policy abe
-
P. Ning, S.D.C. di Vimercati, and P.F. Syverson, eds. Oct.
-
L. Cheung and C. Newport, "Provably Secure Ciphertext Policy Abe," Proc. ACM Conf. Computer and Comm. Security (CCS '07), P. Ning, S.D.C. di Vimercati, and P.F. Syverson, eds., pp. 456-465, Oct. 2007.
-
(2007)
Proc. ACM Conf. Computer and Comm. Security (CCS '07)
, pp. 456-465
-
-
Cheung, L.1
Newport, C.2
-
19
-
-
79952523217
-
Constant size ciphertexts in threshold attribute-based encryption
-
P.Q. Nguyen and D. Pointcheval, eds. May
-
J. Herranz, F. Laguillaumie, and C. Rá fols, "Constant Size Ciphertexts in Threshold Attribute-Based Encryption," Proc. Public Key Cryptography (PKC '10), P.Q. Nguyen and D. Pointcheval, eds., pp. 19-34, May 2010.
-
(2010)
Proc. Public Key Cryptography (PKC '10)
, pp. 19-34
-
-
Herranz, J.1
Laguillaumie, F.2
Rá Fols, C.3
-
20
-
-
77954635558
-
Fully secure functional encryption: Attribute-based encryption and (Hierarchical) inner product encryption
-
H. Gilbert, ed. May/June
-
A. Lewko, T. Okamoto, A. Sahai, K. Takashima, and B. Waters, "Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption," EUROCRYPT '10: Proc. Advances in Cryptology, H. Gilbert, ed., pp. 62-91, May/June 2010.
-
(2010)
EUROCRYPT '10: Proc. Advances in Cryptology
, pp. 62-91
-
-
Lewko, A.1
Okamoto, T.2
Sahai, A.3
Takashima, K.4
Waters, B.5
-
21
-
-
79952521560
-
Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization
-
D. Catalano, N. Fazio, R. Gennaro, and A. Nicolosi, eds. Mar. 6-9
-
B. Waters, "Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization," Proc. 14th Int'l Conf. Practice and Theory in Public Key Cryptography Conf. Public Key Cryptography (PKC '11), D. Catalano, N. Fazio, R. Gennaro, and A. Nicolosi, eds., pp. 53-70, Mar. 6-9 2011.
-
(2011)
Proc. 14th Int'l Conf. Practice and Theory in Public Key Cryptography Conf. Public Key Cryptography (PKC '11)
, pp. 53-70
-
-
Waters, B.1
-
22
-
-
0003745894
-
-
Phd thesis Israel Inst. of Technology, Technion, Haifa, Israel June
-
A. Beimel, "Secure Schemes for Secret Sharing and Key Distribution," Phd thesis, Israel Inst. of Technology, Technion, Haifa, Israel, June 1996.
-
(1996)
Secure Schemes for Secret Sharing and Key Distribution
-
-
Beimel, A.1
-
23
-
-
68849097854
-
Dual-policy attribute based encryption
-
M. Abdalla, D. Pointcheval, P.-A. Fouque, and D. Vergnaud, eds June
-
N. Attrapadung and H. Imai, "Dual-Policy Attribute Based Encryption," Proc. Seventh Int'l Conf. Applied Cryptography and Network Security (ACNS '09), M. Abdalla, D. Pointcheval, P.-A. Fouque, and D. Vergnaud, eds., pp. 168-185, June 2009.
-
(2009)
Proc. Seventh Int'l Conf. Applied Cryptography and Network Security (ACNS '09)
, pp. 168-185
-
-
Attrapadung, N.1
Imai, H.2
-
25
-
-
79952071204
-
FDAC: Toward fine-grained data access control in wireless sensor networks
-
Apr.
-
S. Yu, K. Ren, and W. Lou, "FDAC: Toward Fine-Grained Data Access Control in Wireless Sensor Networks," IEEE Trans. Parallel and Distributed Systems, vol. 22, no. 4, pp. 673-686, Apr. 2011.
-
(2011)
IEEE Trans. Parallel and Distributed Systems
, vol.22
, Issue.4
, pp. 673-686
-
-
Yu, S.1
Ren, K.2
Lou, W.3
-
26
-
-
79957585981
-
Attribute-based access control with efficient revocation in data outsourcing systems
-
July
-
J. Hur and D.K. Noh, "Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems," IEEE Trans. Parallel and Distributed Systems, vol. 22, no. 7, pp. 1214-1221, July 2011.
-
(2011)
IEEE Trans. Parallel and Distributed Systems
, vol.22
, Issue.7
, pp. 1214-1221
-
-
Hur, J.1
Noh, D.K.2
-
27
-
-
77953310709
-
Achieving secure, scalable, and fine-grained data access control in cloud computing
-
Mar.
-
S. Yu, C. Wang, K. Ren, and W. Lou, "Achieving Secure, Scalable, and Fine-Grained Data Access Control in Cloud Computing," Proc. IEEE INFOCOM '10, pp. 534-542, Mar. 2010.
-
(2010)
Proc. IEEE INFOCOM '10
, pp. 534-542
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
-
28
-
-
49049089688
-
Secure distributed key generation for discrete-log based cryptosystems
-
J. Stern, ed. May
-
R. Gennaro, S.law Jarecki, H. Krawczyk, and T. Rabin, "Secure Distributed Key Generation for Discrete-Log Based Cryptosystems," EUROCRYPT '99: Proc. 17th Int'l Conf. Theory and Application of Cryptographic Techniques, J. Stern, ed., pp. 295-310, May 1999.
-
(1999)
EUROCRYPT '99: Proc. 17th Int'l Conf. Theory and Application of Cryptographic Techniques
, pp. 295-310
-
-
Gennaro, R.1
Jarecki, S.L.2
Krawczyk, H.3
Rabin, T.4
-
29
-
-
0035835293
-
Robust threshold DSS signatures
-
R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin, "Robust Threshold DSS Signatures," Information and Computation, vol. 164, no. 1, pp. 54-84, 2001.
-
(2001)
Information and Computation
, vol.164
, Issue.1
, pp. 54-84
-
-
Gennaro, R.1
Jarecki, S.2
Krawczyk, H.3
Rabin, T.4
-
30
-
-
84957653598
-
Distributed pseudo-random functions and KDCs
-
J. Stern, ed. May
-
M. Naor, B. Pinkas, and O. Reingold, "Distributed Pseudo-Random Functions and KDCs," EUROCRYPT '99: Proc. Advances in Cryptology, J. Stern, ed., pp. 327-346, May 1999.
-
(1999)
EUROCRYPT '99: Proc. Advances in Cryptology
, pp. 327-346
-
-
Naor, M.1
Pinkas, B.2
Reingold, O.3
-
31
-
-
69649105305
-
On multi-authority ciphertext-policy attribute-based encryption
-
S. Mü ller, S. Katzenbeisser, and C. Eckert, "On Multi-Authority Ciphertext-Policy Attribute-Based Encryption," Bull. of the Korean Math. Soc., vol. 46, no. 4, pp. 803-819, 2009.
-
(2009)
Bull. of the Korean Math. Soc.
, vol.46
, Issue.4
, pp. 803-819
-
-
Müller, S.1
Katzenbeisser, S.2
Eckert, C.3
-
32
-
-
80052991483
-
Fully Secure multi-authority ciphertext-policy attribute-based encryption without random oracles
-
V. Atluri and C. Diaz, eds. Sept.
-
Z. Liu, Z. Cao, Q. Huang, D.S. Wong, and T.H. Yuen, "Fully Secure Multi-Authority Ciphertext-Policy Attribute-Based Encryption without Random Oracles," Proc. 16th European Symp. Research in Computer Security (ESORICS '11), V. Atluri and C. Diaz, eds., pp. 278-297, Sept. 2011.
-
(2011)
Proc. 16th European Symp. Research in Computer Security (ESORICS '11)
, pp. 278-297
-
-
Liu, Z.1
Cao, Z.2
Huang, Q.3
Wong, D.S.4
Yuen, T.H.5
-
34
-
-
84958612917
-
-
Efficient Group Signature Schemes for Large Groups B.S. Kaliski, Jr., ed. Aug.
-
J. Camenisch and M. Stadler, "Efficient Group Signature Schemes for Large Groups," CRYPTO '97: Proc. 17th Ann. Int'l Cryptology Conf. Advances in Cryptology, B.S. Kaliski, Jr., ed., pp. 410-424, Aug. 1997.
-
(1997)
CRYPTO '97: Proc. 17th Ann. Int'l Cryptology Conf. Advances in Cryptology
, pp. 410-424
-
-
Camenisch, J.1
Stadler, M.2
-
35
-
-
67049154037
-
Blind and anonymous identity-based encryption and authorised private searches on public key encrypted data
-
S. Jarecki and G. Tsudik, eds. Mar.
-
J. Camenisch, M. Kohlweiss, A. Rial, and C. Sheedy, "Blind and Anonymous Identity-Based Encryption and Authorised Private Searches on Public Key Encrypted Data," Proc. 12th Int'l Conf. Practice nad Theory in Public Key Cryptography (PKC '09), S. Jarecki and G. Tsudik, eds., pp. 196-214, Mar. 2009.
-
(2009)
Proc. 12th Int'l Conf. Practice Nad Theory in Public Key Cryptography (PKC '09)
, pp. 196-214
-
-
Camenisch, J.1
Kohlweiss, M.2
Rial, A.3
Sheedy, C.4
-
36
-
-
38149091799
-
Blind identity-based encryption and simulatable oblivious transfer
-
K. Kurosawa, ed. Dec.
-
M. Green and S. Hohenberger, "Blind Identity-Based Encryption and Simulatable Oblivious Transfer," ASIACRYPT '07: Proc. 13th Int'l Conf. Theory and Application of Cryptology and Information Security: Advances in Cryptology, K. Kurosawa, ed., pp. 265-282, Dec. 2007.
-
(2007)
ASIACRYPT '07: Proc. 13th Int'l Conf. Theory and Application of Cryptology and Information Security: Advances in Cryptology
, pp. 265-282
-
-
Green, M.1
Hohenberger, S.2
-
37
-
-
0022145479
-
Security without identification: Transaction systems to make big brother obsolete
-
DOI 10.1145/4372.4373
-
D. Chaum, "Security without Identification: Transaction Systems to Make Big Brother Obsolete," Comm. ACM, vol. 28, no. 10, pp. 1030-1044, 1985. (Pubitemid 15587967)
-
(1985)
Communications of the ACM
, vol.28
, Issue.10
, pp. 1030-1044
-
-
Chaum David1
-
38
-
-
84945135810
-
An efficient system for non-transferable anonymous credentials with optional anonymity revocation
-
Advances in Cryptology - EUROCRYPT 2001 International Conference on the Theory and Application of Cryptographic Techniques
-
J. Camenisch and A. Lysyanskaya, "An Efficient System for Non-Transferable Anonymous Credentials with Optional Anonymity Revocation," EUROCRYPT '01: Proc. Int'l Conf. the Theory and Application of Cryptographic Techniques: Advances in Cryptology, B. Pfitzmann, ed., pp. 93-118, May 2001. (Pubitemid 33275827)
-
(2001)
Lecture Notes in Computer Science
, Issue.2045
, pp. 93-118
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
39
-
-
67651053584
-
Pseudonym systems
-
H.M. Heys and C. M. Adams, eds. Aug.
-
A. Lysyanskaya, R.L. Rivest, A. Sahai, and S. Wolf, "Pseudonym Systems," Proc. Sixth Ann. Int'l Workshop Selected Areas in Cryptography (SAC '99), H.M. Heys and C. M. Adams, eds., pp. 184-199, Aug. 1999.
-
(1999)
Proc. Sixth Ann. Int'l Workshop Selected Areas in Cryptography (SAC '99)
, pp. 184-199
-
-
Lysyanskaya, A.1
Rivest, R.L.2
Sahai, A.3
Wolf, S.4
|