-
1
-
-
77954625601
-
Efficient lattice (H) IBE in the standard model
-
Springer
-
Agrawal, S., Boneh, D., and Boyen, X. Efficient lattice (H) IBE in the standard model. In Proceedings of EUROCRYPT, Lecture Notes in Computer Science, Springer, 2010, 553-572.
-
(2010)
Proceedings of EUROCRYPT, Lecture Notes in Computer Science
, pp. 553-572
-
-
Agrawal, S.1
Boneh, D.2
Boyen, X.3
-
2
-
-
83055162353
-
Functional encryption for inner product predicates from learning with errors
-
Springer
-
Agrawal, S., Freeman, D. M., and Vaikuntanathan, V. Functional encryption for inner product predicates from learning with errors. In Proceedings of ASIACRYPT, Lecture Notes in Computer Science, Springer, 2011, 21-40.
-
(2011)
Proceedings of ASIACRYPT, Lecture Notes in Computer Science
, pp. 21-40
-
-
Agrawal, S.1
Freeman, D.M.2
Vaikuntanathan, V.3
-
3
-
-
34548731375
-
Ciphertextpolicy attribute-based encryption
-
IEEE Computer Society
-
Bethencourt, J., Sahai, A., and Waters, B. Ciphertextpolicy attribute-based encryption. In Proceedings of the IEEE Symposium on Security and Privacy, IEEE Computer Society, 2007, 321-334.
-
(2007)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
4
-
-
35048841300
-
Efficient selective-id secure identity-based encryption without random oracles
-
Springer
-
Boneh, D. and Boyen, X. Efficient selective-id secure identity-based encryption without random oracles. In Proceedings of EUROCRYPT, Lecture Notes in Computer Science, Springer, 2004, 223-238.
-
(2004)
Proceedings of EUROCRYPT, Lecture Notes in Computer Science
, pp. 223-238
-
-
Boneh, D.1
Boyen, X.2
-
5
-
-
35048901123
-
Public-key encryption with keyword search
-
Springer
-
Boneh, D., Crescenzo, G. D., Ostrovsky, R., and Persiano G. Public-key encryption with keyword search. In Proceedings of EUROCRYPT, Lecture Notes in Computer Science, Springer, 2004, 506-522.
-
(2004)
Proceedings of EUROCRYPT, Lecture Notes in Computer Science
, pp. 506-522
-
-
Boneh, D.1
Crescenzo, G.D.2
Ostrovsky, R.3
Persiano, G.4
-
6
-
-
84874324906
-
Identity-based encryption from the weil pairing
-
Springer
-
Boneh, D. and Franklin, M. K. Identity-based encryption from the weil pairing. In Proceedings of Crypto, Lecture Notes in Computer Science, Springer, 2001, 213-229.
-
(2001)
Proceedings of Crypto, Lecture Notes in Computer Science
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.K.2
-
7
-
-
79953230454
-
Functional encryption: Definitions and challenges
-
Springer
-
Boneh, D., Sahai, A., and Waters, B. Functional encryption: Definitions and challenges. In Proceedings of TCC, Lecture Notes in Computer Science, Springer 2011, 253-273.
-
(2011)
Proceedings of TCC, Lecture Notes in Computer Science
, pp. 253-273
-
-
Boneh, D.1
Sahai, A.2
Waters, B.3
-
8
-
-
38049045519
-
Conjunctive, subset, and range queries on encrypted data
-
Springer
-
Boneh, D. and Waters, B. Conjunctive, subset, and range queries on encrypted data. In Proceedings of TCC, Lecture Notes in Computer Science, Springer, 2007, 535-554.
-
(2007)
Proceedings of TCC, Lecture Notes in Computer Science
, pp. 535-554
-
-
Boneh, D.1
Waters, B.2
-
13
-
-
77649240581
-
Computing arbitrary functions of encrypted data
-
Mar.
-
Gentry, C. Computing arbitrary functions of encrypted data. Commun. ACM 53, 3(Mar. 2010), 97-105.
-
(2010)
Commun. ACM
, vol.53
, Issue.3
, pp. 97-105
-
-
Gentry, C.1
-
14
-
-
70350642087
-
Fully homomorphic encryption using ideal lattices
-
ACM Press, New York
-
Gentry, C. Fully homomorphic encryption using ideal lattices. In Proceedings of STOC 2009, ACM Press, New York, 2009, 169-178.
-
(2009)
Proceedings of STOC 2009
, pp. 169-178
-
-
Gentry, C.1
-
16
-
-
51849137205
-
Trapdoors for hard lattices and new cryptographic constructions
-
ACM Press, New York
-
Gentry, C., Peikert, C., and Vaikuntanathan, V. Trapdoors for hard lattices and new cryptographic constructions. In Proceedings of STOC, ACM Press, New York, 2008, 197-206.
-
(2008)
Proceedings of STOC
, pp. 197-206
-
-
Gentry, C.1
Peikert, C.2
Vaikuntanathan, V.3
-
17
-
-
70349557354
-
Hierarchical id-based cryptography
-
Springer
-
Gentry, C. and Silverberg, A. Hierarchical id-based cryptography. In Proceedings of ASIACRYPT 2002, Lecture Notes in Computer Science, Springer, 2002, 548-566.
-
(2002)
Proceedings of ASIACRYPT 2002, Lecture Notes in Computer Science
, pp. 548-566
-
-
Gentry, C.1
Silverberg, A.2
-
18
-
-
0023545076
-
How to play any mental game or a completeness theorem for protocols with honest majority
-
ACM Press, New York
-
Goldreich, O., Micali, S., and Wigderson, A. How to play any mental game or a completeness theorem for protocols with honest majority. In Proceedings of STOC, ACM Press, New York, 1987, 218-229.
-
(1987)
Proceedings of STOC
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
19
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
ACM Press, New York
-
Goyal, V., Pandey, O., Sahai, A., and Waters, B. Attribute-based encryption for fine-grained access control of encrypted data. In Proceedings of the ACM Conference on Computer and Communications Security, ACM Press, New York, 2006, 89-98.
-
(2006)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
20
-
-
84947242701
-
Toward hierarchical identitybased encryption
-
Springer
-
Horwitz, J. and Lynn, B. Toward hierarchical identitybased encryption. In Proceedings of EUROCRYPT, Lecture Notes in Computer Science, Springer, 2002, 466-481.
-
(2002)
Proceedings of EUROCRYPT, Lecture Notes in Computer Science
, pp. 466-481
-
-
Horwitz, J.1
Lynn, B.2
-
21
-
-
44449129423
-
Predicate encryption supporting disjunctions, polynomial equations, and inner products
-
Springer
-
Katz, J., Sahai, A., and Waters, B. Predicate encryption supporting disjunctions, polynomial equations, and inner products. In Proceedings of EUROCRYPT, Lecture Notes in Computer Science, Springer, 2008, 146-162.
-
(2008)
Proceedings of EUROCRYPT, Lecture Notes in Computer Science
, pp. 146-162
-
-
Katz, J.1
Sahai, A.2
Waters, B.3
-
22
-
-
77954635558
-
Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption
-
Springer
-
Lewko, A. B., Okamoto, T., Sahai, A., Takashima, K., and Waters, B. Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption. In Proceedings of EUROCRYPT, Lecture Notes in Computer Science, Springer, 2010, 62-91.
-
(2010)
Proceedings of EUROCRYPT, Lecture Notes in Computer Science
, pp. 62-91
-
-
Lewko, A.B.1
Okamoto, T.2
Sahai, A.3
Takashima, K.4
Waters, B.5
-
23
-
-
77955211933
-
Revocation systems with very small private keys
-
IEEE Computer Society
-
Lewko, A. B., Sahai, A., and Waters, B. Revocation systems with very small private keys. In Proceedings of the IEEE Symposium on Security, IEEE Computer Society, 2010, 273-285.
-
(2010)
Proceedings of the IEEE Symposium on Security
, pp. 273-285
-
-
Lewko, A.B.1
Sahai, A.2
Waters, B.3
-
24
-
-
79957993008
-
Decentralizing attributebased encryption
-
Springer
-
Lewko, A. B. and Waters, B. Decentralizing attributebased encryption. In Proceedings of EUROCRYPT, Lecture Notes in Computer Science, Springer, 2011, 568-588.
-
(2011)
Proceedings of EUROCRYPT, Lecture Notes in Computer Science
, pp. 568-588
-
-
Lewko, A.B.1
Waters, B.2
-
25
-
-
77957011503
-
Fully secure functional encryption with general relations from the decisional linear assumption
-
Springer
-
Okamoto, T. and Takashima, K. Fully secure functional encryption with general relations from the decisional linear assumption. In Proceedings of CRYPTO, Lecture Notes in Computer Science, Springer, 2010, 191-208.
-
(2010)
Proceedings of CRYPTO, Lecture Notes in Computer Science
, pp. 191-208
-
-
Okamoto, T.1
Takashima, K.2
-
26
-
-
74049120601
-
Attribute-based encryption with non-monotonic access structures
-
ACM Press, New York
-
Ostrovsky, R., Sahai, A., and Waters, B. Attribute-based encryption with non-monotonic access structures. In Proceedings of the ACM Conference on Computer and Communications Security, ACM Press, New York, 2007, 195-203.
-
(2007)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 195-203
-
-
Ostrovsky, R.1
Sahai, A.2
Waters, B.3
-
27
-
-
78650004801
-
Worry-free encryption: Functional encryption with public keys
-
ACM Press, New York
-
Sahai, A. and Seyalioglu, H. Worry-free encryption: Functional encryption with public keys. In Proceedings of the ACM Conference on Computer and Communications, ACM Press, New York, 2010, 463-472.
-
(2010)
Proceedings of the ACM Conference on Computer and Communications
, pp. 463-472
-
-
Sahai, A.1
Seyalioglu, H.2
-
28
-
-
24944554962
-
Fuzzy identity-based encryption
-
Springer
-
Sahai, A. and Waters, B. Fuzzy identity-based encryption. In Proceedings of EUROCRYPT, Lecture Notes in Computer Science, Springer, 2005, 457-473.
-
(2005)
Proceedings of EUROCRYPT, Lecture Notes in Computer Science
, pp. 457-473
-
-
Sahai, A.1
Waters, B.2
-
31
-
-
70350345210
-
Dual-system encryption: Realizing fully secure ibe and hibe under simple assumptions
-
Springer
-
Waters, B. Dual-system encryption: Realizing fully secure ibe and hibe under simple assumptions. In Proceedings of CRYPTO, Lecture Notes in Computer Science, Springer, 2009, 619-636.
-
(2009)
Proceedings of CRYPTO, Lecture Notes in Computer Science
, pp. 619-636
-
-
Waters, B.1
-
32
-
-
79952521560
-
Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization
-
Springer
-
Waters, B. Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization. In Proceedings of the Public Key Cryptography Conference, Lecture Notes in Computer Science, Springer, 2011, 53-70.
-
(2011)
Proceedings of the Public Key Cryptography Conference, Lecture Notes in Computer Science
, pp. 53-70
-
-
Waters, B.1
-
33
-
-
0020312165
-
Protocols for secure computations (extended abstract)
-
IEEE Computer Society
-
Yao, A. C.-C. Protocols for secure computations (extended abstract). In Proceedings of FOCS, IEEE Computer Society, 1982, 160-164.
-
(1982)
Proceedings of FOCS
, pp. 160-164
-
-
Yao, A.C.-C.1
|