-
1
-
-
79952510987
-
Expressive keypolicy attribute-based encryption with constant-size ciphertexts
-
Taormina, Italy, March
-
N. Attrapadung and B. Libert, "Expressive keypolicy attribute-based encryption with constant-size ciphertexts," in Proceedings of 14th International Conference on Practice and Theory in Public Key Cryptography (PKC 2011), pp. 90-108, Taormina, Italy, March 2011.
-
(2011)
Proceedings of 14th International Conference on Practice and Theory in Public Key Cryptography (PKC 2011)
, pp. 90-108
-
-
Attrapadung, N.1
Libert, B.2
-
2
-
-
0003745894
-
Secure schemes for secret sharing and key distribution
-
Haifa, Israel
-
A. Beimel, "Secure schemes for secret sharing and key distribution," Israel Institute of Technology, Haifa, Israel, 1996.
-
(1996)
Israel Institute of Technology
-
-
Beimel, A.1
-
3
-
-
33745166648
-
Collusion resistant broadcast encryption with short ciphertexts and private keys
-
Santa Barbara, California, USA, August
-
D. Boneh, C. Gentry, and B. Waters, "Collusion resistant broadcast encryption with short ciphertexts and private keys," in Proceedings of Advances in Cryptology - 25th Annual International Cryptology Conference (CRYPTO 2005), pp. 258-275, Santa Barbara, California, USA, August 2005.
-
(2005)
Proceedings of Advances in Cryptology - 25th Annual International Cryptology Conference (CRYPTO 2005)
, pp. 258-275
-
-
Boneh, D.1
Gentry, C.2
Waters, B.3
-
4
-
-
82955217443
-
Multi-authority attribute based encryption with honest-but-curious central authority
-
V. Boẑović, D. Socek, R. Steinwandt, and V. Villanyi, "Multi-authority attribute based encryption with honest-but-curious central authority," IACR Cryptology ePrint Archive, 2009.
-
(2009)
IACR Cryptology ePrint Archive
-
-
Boẑović, V.1
Socek, D.2
Steinwandt, R.3
Villanyi, V.4
-
5
-
-
35048852705
-
Chosenciphertext security from identity-based encryption
-
Interlaken, Switzerland, May
-
R. Canetti, S. Halevi, and J. Katz, "Chosenciphertext security from identity-based encryption," in Proceedings of Advances in Cryptology - 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2004), pp. 207-128, Interlaken, Switzerland, May 2004.
-
(2004)
Proceedings of Advances in Cryptology - 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2004)
, pp. 207-128
-
-
Canetti, R.1
Halevi, S.2
Katz, J.3
-
6
-
-
84875247383
-
On the existence of distortion maps on ordinary elliptic curves
-
D. Charles, "On the existence of distortion maps on ordinary elliptic curves," IACR Cryptology ePrint Archive, 2006.
-
(2006)
IACR Cryptology ePrint Archive
-
-
Charles, D.1
-
7
-
-
38049078557
-
Multi-authority attribute based encryption
-
Amsterdam, The Netherlands, February
-
M. Chase, "Multi-authority attribute based encryption," in Theory of Cryptography (TCC 2007), pp. 515-534, Amsterdam, The Netherlands, February 2007.
-
(2007)
Theory of Cryptography (TCC 2007)
, pp. 515-534
-
-
Chase, M.1
-
8
-
-
74049163235
-
Improving privacy and security in multi-authority attribute based encryption
-
Chicago, Illinois, USA, October
-
M. Chase and S. Chow, "Improving privacy and security in multi-authority attribute based encryption," in Proceddings of 16th ACM Conference on Computer and Communications Security (CCS'2009), pp. 121-130, Chicago, Illinois, USA, October 2010.
-
(2010)
Proceddings of 16th ACM Conference on Computer and Communications Security (CCS'2009)
, pp. 121-130
-
-
Chase, M.1
Chow, S.2
-
9
-
-
80053159200
-
E±cient ciphertext policy attribute-based encryption with constantsize ciphertext and constant computation-cost
-
Xi'an, China, October
-
C. Chen, Z. Zhang, and D. Feng, "E±cient ciphertext policy attribute-based encryption with constantsize ciphertext and constant computation-cost," in Proceedings of 5th International Conference, ProvSec 2011, pp. 84-101, Xi'an, China, October 2011.
-
(2011)
Proceedings of 5th International Conference, ProvSec 2011
, pp. 84-101
-
-
Chen, C.1
Zhang, Z.2
Feng, D.3
-
10
-
-
45749116552
-
Provably secure ciphertext policy attribute based encryption
-
Alexandria, VA, USA, October
-
L. Cheung and C. Newport, "Provably secure ciphertext policy attribute based encryption," in Proceedings of 14th ACM Conference on Computer and Communication Security (CCS'2007), pp. 456-465, Alexandria, VA, USA, October 2007.
-
(2007)
Proceedings of 14th ACM Conference on Computer and Communication Security (CCS'2007)
, pp. 456-465
-
-
Cheung, L.1
Newport, C.2
-
11
-
-
84875265201
-
New privacy-preserving architectures for identity-/attribute-based encryption
-
S. S. M. Chow, "New privacy-preserving architectures for identity-/attribute-based encryption," New York University, 2010.
-
(2010)
New York University
-
-
Chow, S.S.M.1
-
12
-
-
70350635850
-
A ciphertext-policy attribute-based encryption scheme with constant ciphertext length
-
Xi'an, China, April
-
K. Emura, A. Miyaji, A. Nomura, K. Omote, and M. Soshi, "A ciphertext-policy attribute-based encryption scheme with constant ciphertext length," in Proceedings of Information Security Practice and Experience - 8th International Conference (ISPEC 2009), pp. 13-23, Xi'an, China, April 2009.
-
(2009)
Proceedings of Information Security Practice and Experience - 8th International Conference (ISPEC 2009)
, pp. 13-23
-
-
Emura, K.1
Miyaji, A.2
Nomura, A.3
Omote, K.4
Soshi, M.5
-
13
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
Alexandria, VA, USA, October
-
V. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attribute-based encryption for fine-grained access control of encrypted data," in Proceedings of 13th ACM Conference on Computer and Communication Security (CCS'2006), pp. 89-98, Alexandria, VA, USA, October 2006.
-
(2006)
Proceedings of 13th ACM Conference on Computer and Communication Security (CCS'2006)
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
14
-
-
79952523217
-
Constant size ciphertexts in threshold attribute-based encryption
-
Paris, France, May
-
J. Herranz, F. Laguillaumie, and C. Rafols, "Constant size ciphertexts in threshold attribute-based encryption," in Proceedings of 13th International Conference on Practice and Theory in Public Key Cryptography (PKC 2010), pp. 19-34, Paris, France, May 2010.
-
(2010)
Proceedings of 13th International Conference on Practice and Theory in Public Key Cryptography (PKC 2010)
, pp. 19-34
-
-
Herranz, J.1
Laguillaumie, F.2
Rafols, C.3
-
15
-
-
79957993008
-
Decentralizing attributebased encryption
-
Tallinn, Estonia, May
-
A. Lewko and B. Waters, "Decentralizing attributebased encryption," in Proceedings of Advances in Cryptology - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 568-588, Tallinn, Estonia, May 2011.
-
(2011)
Proceedings of Advances in Cryptology - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques
, pp. 568-588
-
-
Lewko, A.1
Waters, B.2
-
16
-
-
79956000593
-
A2be: Accountable attribute-based encryption for abuse free access control
-
J. Li, K. Ren, and K. Kim, "A2be: Accountable attribute-based encryption for abuse free access control," IACR Cryptology ePrint Archive, 2009.
-
(2009)
IACR Cryptology ePrint Archive
-
-
Li, J.1
Ren, K.2
Kim, K.3
-
17
-
-
58749115565
-
Secure threshold multi authority attribute based encryption without a central authority
-
Kharagpur, India, December
-
H. Lin, Z. Cao, X. Liang, and J. Shao, "Secure threshold multi authority attribute based encryption without a central authority," in Proceedings of 9th International Conference on Cryptology in India (INDOCRYPT 2008), pp. 426-436, Kharagpur, India, December 2008.
-
(2008)
Proceedings of 9th International Conference on Cryptology in India (INDOCRYPT 2008)
, pp. 426-436
-
-
Lin, H.1
Cao, Z.2
Liang, X.3
Shao, J.4
-
18
-
-
80052991483
-
Fully secure multi-authority ciphertextpolicy attribute-based encryption without random oracles
-
Leuven, Belgium, September
-
Z. Liu, Z. Cao, Q. Huang, D. S. Wong, and T. H. Yuen, "Fully secure multi-authority ciphertextpolicy attribute-based encryption without random oracles," in Proceedings of 16th European Symposium on Research in Computer Security (ESORICS 2011), pp. 278-297, Leuven, Belgium, September 2011.
-
(2011)
in Proceedings of 16th European Symposium on Research in Computer Security (ESORICS 2011)
, pp. 278-297
-
-
Liu, Z.1
Cao, Z.2
Huang, Q.3
Wong, D.S.4
Yuen, T.H.5
-
19
-
-
74049120601
-
Attribute-based encryption with non-monotonic access structures
-
Alexandria, VA, USA, October
-
R. Ostrovsky, A. Sahai, and B. Waters, "Attribute-based encryption with non-monotonic access structures," in Proceedings of 14th ACM Conference on Computer and Communication Security (CCS'2007), pp. 195-203, Alexandria, VA, USA, October 2007.
-
(2007)
Proceedings of 14th ACM Conference on Computer and Communication Security (CCS'2007)
, pp. 195-203
-
-
Ostrovsky, R.1
Sahai, A.2
Waters, B.3
-
20
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Communications of the ACM, vol. 21, no. 2, pp. 158-164, 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 158-164
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
21
-
-
24944554962
-
Fuzzy identity-based encryption
-
Santa Barbara, California, USA, August
-
A. Sahai and B. Waters, "Fuzzy identity-based encryption," in Proceedings of Advances in Cryptology - 25th Annual International Cryptology Conference (CRYPTO 2005), pp. 457-473, Santa Barbara, California, USA, August 2005.
-
(2005)
Proceedings of Advances in Cryptology - 25th Annual International Cryptology Conference (CRYPTO 2005)
, pp. 457-473
-
-
Sahai, A.1
Waters, B.2
-
22
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Santa Barbara, California, USA, August
-
A. Shamir, "Identity-based cryptosystems and signature schemes," in Proceedings of Advances in Cryptology - 4th Annual International Cryptology Conference (CRYPTO 1984), pp. 47-53, Santa Barbara, California, USA, August 1984.
-
(1984)
Proceedings of Advances in Cryptology - 4th Annual International Cryptology Conference (CRYPTO 1984)
, pp. 47-53
-
-
Shamir, A.1
-
23
-
-
70350345210
-
Dual system encryption: realizing fully secure ibe and hibe under simple assumptions
-
Santa Barbara, CA, USA, August
-
B. Waters, "Dual system encryption: realizing fully secure ibe and hibe under simple assumptions," in Proceedings of Advances in Cryptology - 29th Annual International Cryptology Conference (CRYPTO 2009), pp. 619-636, Santa Barbara, CA, USA, August 2009.
-
(2009)
Proceedings of Advances in Cryptology - 29th Annual International Cryptology Conference (CRYPTO 2009)
, pp. 619-636
-
-
Waters, B.1
-
24
-
-
79956331914
-
Ciphertext-policy attribute-based encryption: an expressive,efficient, and provably secure realization
-
Taormina, Italy, March
-
B. Waters, "Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization," in Proceedings of 14th International Conference on Practice and Theory in Public Key Cryptography (PKC 2011), pp. 90-107, Taormina, Italy, March 2011.
-
(2011)
Proceedings of 14th International Conference on Practice and Theory in Public Key Cryptography (PKC 2011)
, pp. 90-107
-
-
Waters, B.1
-
25
-
-
78650001392
-
On efficient ciphertextpolicy attribute based encryption and broadcast encryption
-
New York, NY, USA, October
-
Z. Zhou and D. Huang, "On efficient ciphertextpolicy attribute based encryption and broadcast encryption," in Proceedings of the 17th ACM conference on Computer and communications security (CCS 2010), pp. 753-755, New York, NY, USA, October 2010.
-
(2010)
Proceedings of the 17th ACM conference on Computer and communications security (CCS 2010)
, pp. 753-755
-
-
Zhou, Z.1
Huang, D.2
|