-
2
-
-
70350345210
-
Dual system encryption: Realizing fully secure IBE and HIBE under simple assumptions
-
Berlin: Springer- Verlag
-
B. Waters. "Dual system encryption: realizing fully secure IBE and HIBE under simple assumptions," in Advances in Cryptology - CRYPTO. 2009. Berlin: Springer-Verlag. pp. 619-636.
-
(2009)
Advances in Cryptology - CRYPTO
, pp. 619-636
-
-
Waters, B.1
-
3
-
-
77954635558
-
Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption
-
Berlin: Springer- Verlag
-
A. Lewko and T. Okamoto. "Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption," in Advances in Cryptology - EUROCRYPT. 2010. Berlin: Springer-Verlag. pp. 62-91.
-
(2010)
Advances in Cryptology - EUROCRYPT
, pp. 62-91
-
-
Lewko, A.1
Okamoto, T.2
-
4
-
-
69949143544
-
Conjunctive broadcast and attribute-based encryption
-
Berlin: Springer- Verlag
-
N. Attrapadung and H. Imai, "Conjunctive broadcast and attribute-based encryption," in Pairing-Based Cryptography - Pairing. 2009. Berlin: Springer-Verlag. pp. 248-265.
-
(2009)
Pairing-Based Cryptography - Pairing
, pp. 248-265
-
-
Attrapadung, N.1
Imai, H.2
-
5
-
-
72449201970
-
Attribute-based encryption supporting direct/indirect revocation modes
-
Berlin: Springer- Verlag
-
N. Attrapadung and H. Imai. "Attribute-based encryption supporting direct/indirect revocation modes," in Cryptography and Coding. 2009. Berlin: Springer-Verlag. pp. 278-300.
-
(2009)
Cryptography and Coding
, pp. 278-300
-
-
Attrapadung, N.1
Imai, H.2
-
6
-
-
24944554962
-
Fuzzy identity-based encryption
-
Proceedings of EUROCRYPT
-
A. Sahai and B. Waters. "Fuzzy identity-based encryption," in Proceedings of EUROCRYPT, volume 3494 of LNCS. 2005. pp. 457-473.
-
(2005)
LNCS
, vol.3494
, pp. 457-473
-
-
Sahai, A.1
Waters, B.2
-
11
-
-
38049078557
-
Multi-authority attribute based encryption
-
Proceedings of TCC
-
M. Chase. "Multi-authority attribute based encryption," in Proceedings of TCC, volume 4392 of LNCS. 2007. pp. 515-534.
-
(2007)
LNCS
, vol.4392
, pp. 515-534
-
-
Chase, M.1
-
12
-
-
74049163235
-
Improving privacy and security in multiauthority attribute-based encryption
-
M. Chase and S. Chow. "Improving privacy and security in multiauthority attribute-based encryption," in In Proceedings of ACM CCS. 2009. pp. 121-130.
-
Proceedings of ACM CCS. 2009
, pp. 121-130
-
-
Chase, M.1
Chow, S.2
-
13
-
-
77953310709
-
Achieving secure, scalable, and fine-grained data access control in cloud computing
-
S. Yu, C. Wang, K. Ren and W. Lou. "Achieving secure, scalable, and fine-grained data access control in cloud computing," in Proceedings of INFOCOM. 2010. pp. 534-542.
-
Proceedings of INFOCOM. 2010
, pp. 534-542
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
-
16
-
-
78649998200
-
Hierarchical attribute-based encryption for fine-grained access control in cloud storage services
-
G. Wang, Q. Liu and J. Wu. "Hierarchical attribute-based encryption for fine-grained access control in cloud storage services," in Proceedings of ACM CCS. 2010. pp. 735-737.
-
Proceedings of ACM CCS. 2010
, pp. 735-737
-
-
Wang, G.1
Liu, Q.2
Wu, J.3
-
17
-
-
79960839401
-
Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers
-
G. Wang, Q. Liu, J. Wu and M. Guo. "Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers," Journal of Computers and Security. 2011. 5(30): pp. 320-331.
-
(2011)
Journal of Computers and Security
, vol.5
, Issue.30
, pp. 320-331
-
-
Wang, G.1
Liu, Q.2
Wu, J.3
Guo, M.4
-
18
-
-
77954471010
-
Attribute based data sharing with attribute revocation
-
S. Yu, C. Wang and K. Ren. "Attribute based data sharing with attribute revocation," in Proceeding of ASIACCS. 2010. pp. 261-270.
-
Proceeding of ASIACCS. 2010
, pp. 261-270
-
-
Yu, S.1
Wang, C.2
Ren, K.3
-
19
-
-
79959612798
-
Attribute based encryption schemes
-
JS. Su, D. Cao and XF.Wang. "Attribute based encryption schemes," Journal of Software. 2011. 22(6): pp. 1299-1315.
-
(2011)
Journal of Software
, vol.22
, Issue.6
, pp. 1299-1315
-
-
Su, J.S.1
Cao, D.2
Wang, X.F.3
-
20
-
-
33646773956
-
Identity-based hierarchical strongly key-insulated encryption and its application
-
Berlin: Springer- Verlag
-
Y. Hanaoka, G. Hanaoka, J. Shikata and H. Imai. "Identity-based hierarchical strongly key-insulated encryption and its application," in Advances in Cryptology - ASIACRYPT. 2005. Berlin: Springer-Verlag. pp. 495-514.
-
(2005)
Advances in Cryptology - ASIACRYPT
, pp. 495-514
-
-
Hanaoka, Y.1
Hanaoka, G.2
Shikata, J.3
Imai, H.4
-
22
-
-
33745166648
-
Collusion resistant broadcast encryption with short ciphertexts and private keys
-
Proceedings of CRYPTO
-
D. Boneh, C. Gentry and B. Waters. "Collusion resistant broadcast encryption with short ciphertexts and private keys," in Proceedings of CRYPTO, volume 3621 of LNCS. 2005. pp. 258-275.
-
(2005)
LNCS
, vol.3621
, pp. 258-275
-
-
Boneh, D.1
Gentry, C.2
Waters, B.3
-
23
-
-
79957585981
-
Attribute-based access control with efficient revocation in data outsourcing systems
-
JD. Hur and K. Noh. "Attribute-based access control with efficient revocation in data outsourcing systems," Parallel and Distributed Systems, IEEE Transactions. 2011. 22(7): pp. 1214-1221.
-
(2011)
Parallel and Distributed Systems, IEEE Transactions
, vol.22
, Issue.7
, pp. 1214-1221
-
-
Hur, J.D.1
Noh, K.2
-
24
-
-
83755170574
-
Towards attribute revocation in key-policy attribute based encryption
-
The 10th International Conference on Cryptography and Network Security
-
PP. Wang, DG. Feng and LW. Zhang. "Towards attribute revocation in key-policy attribute based encryption," in The 10th International Conference on Cryptography and Network Security. volume 7092 of CANS. 2011. pp. 272-291.
-
(2011)
CANS
, vol.7092
, pp. 272-291
-
-
Wang, P.P.1
Feng, D.G.2
Zhang, L.W.3
-
26
-
-
44449129423
-
Predicate Encryption supporting disjunctions, polynomial equations and inner products
-
Berlin: Springer- Verlag
-
J. Katz, A. Sahai and B. Waters. "Predicate Encryption supporting disjunctions, polynomial equations and inner products," in Advances in Cryptology - EUROCRYPT. 2008. Berlin: Springer-Verlag. pp. 146-162.
-
(2008)
Advances in Cryptology - EUROCRYPT
, pp. 146-162
-
-
Katz, J.1
Sahai, A.2
Waters, B.3
|