-
1
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
DOI 10.1145/1180405.1180418, 1180418, CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security
-
Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for finegrained access control of encrypted data. In: CCS 2006, pp. 89-98 (2006) (Pubitemid 47131359)
-
(2006)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
2
-
-
84985922619
-
Tracing traitors
-
Desmedt, Y.G. (ed.) LNCS Springer, Heidelberg
-
Chor, B., Fiat, A., Naor, M.: Tracing traitors. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 257-270. Springer, Heidelberg (1994)
-
(1994)
CRYPTO 1994
, vol.839
, pp. 257-270
-
-
Chor, B.1
Fiat, A.2
Naor, M.3
-
3
-
-
84957085257
-
An efficient public key traitor tracing scheme
-
Wiener, M. (ed.) LNCS Springer, Heidelberg
-
Boneh, D., Franklin, M.K.: An efficient public key traitor tracing scheme. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 338-353. Springer, Heidelberg (1999)
-
(1999)
CRYPTO 1999
, vol.1666
, pp. 338-353
-
-
Boneh, D.1
Franklin, M.K.2
-
4
-
-
84947273176
-
Traitor tracing with constant transmission rate
-
Knud-sen, L.R. (ed.) LNCS Springer, Heidelberg
-
Kiayias, A., Yung, M.: Traitor tracing with constant transmission rate. In: Knud-sen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 450-465. Springer, Heidelberg (2002)
-
(2002)
EUROCRYPT 2002
, vol.2332
, pp. 450-465
-
-
Kiayias, A.1
Yung, M.2
-
5
-
-
33746104815
-
Fully collusion resistant traitor tracing with short ciphertexts and private keys
-
DOI 10.1007/11761679-34, Advances in Cryptology - EUROCRYPT 2006 - 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
-
Boneh, D., Sahai, A., Waters, B.: Fully collusion resistant traitor tracing with short ciphertexts and private keys. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 573-592. Springer, Heidelberg (2006) (Pubitemid 44072262)
-
(2006)
Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4004
, pp. 573-592
-
-
Boneh, D.1
Sahai, A.2
Waters, B.3
-
6
-
-
45749094622
-
Attribute-based encryption with partially hidden encryptor-specified access structures
-
Bellovin, S.M., Gennaro, R., Keromytis, A.D., Yung, M. (eds.) LNCS Springer, Heidelberg
-
Nishide, T., Yoneyama, K., Ohta, K.: Attribute-based encryption with partially hidden encryptor-specified access structures. In: Bellovin, S.M., Gennaro, R., Keromytis, A.D., Yung, M. (eds.) ACNS 2008. LNCS, vol. 5037, pp. 111-129. Springer, Heidelberg (2008)
-
(2008)
ACNS 2008
, vol.5037
, pp. 111-129
-
-
Nishide, T.1
Yoneyama, K.2
Ohta, K.3
-
7
-
-
24944554962
-
Fuzzy identity-based encryption
-
Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
-
Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EU-ROCRYPT 2005. LNCS, vol. 3494, pp. 457-473. Springer, Heidelberg (2005) (Pubitemid 41313969)
-
(2005)
Lecture Notes in Computer Science
, vol.3494
, pp. 457-473
-
-
Sahai, A.1
Waters, B.2
-
8
-
-
34548731375
-
Ciphertext-policy attribute-based encryption
-
DOI 10.1109/SP.2007.11, 4223236, Proceedings - S and P 2007: 2007 IEEE Symposium on Security and Privacy, SP'07
-
Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: SP 2007, Washington, DC, USA, pp. 321-334. IEEE Computer Society, Los Alamitos (2007) (Pubitemid 47432538)
-
(2007)
Proceedings - IEEE Symposium on Security and Privacy
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
9
-
-
45749116552
-
Provably secure ciphertext policy abe
-
ACM, New York
-
Cheung, L., Newport, C.: Provably secure ciphertext policy abe. In: CCS 2007, pp. 456-465. ACM, New York (2007)
-
(2007)
CCS 2007
, pp. 456-465
-
-
Cheung, L.1
Newport, C.2
-
10
-
-
34548769073
-
Attribute-based publishing with hidden credentials and hidden policies
-
LNCS Springer, Heidelberg
-
Kapadia, A., Tsang, P., Smith, S.: Attribute-based publishing with hidden credentials and hidden policies. In: NDSS 2007. LNCS, vol. 5037, pp. 179-192. Springer, Heidelberg (2007)
-
(2007)
NDSS 2007
, vol.5037
, pp. 179-192
-
-
Kapadia, A.1
Tsang, P.2
Smith, S.3
-
11
-
-
70349086608
-
Attribute-based on-demand multicast group setup with membership anonymity
-
Yu, S., Ren, K., Lou, W.: Attribute-based on-demand multicast group setup with membership anonymity. In: Securecomm (2008)
-
(2008)
Securecomm
-
-
Yu, S.1
Ren, K.2
Lou, W.3
-
12
-
-
58049192731
-
Attribute-based content distribution with hidden policy
-
Yu, S., Ren, K., Lou, W.: Attribute-based content distribution with hidden policy. In: NPSEC (2008)
-
(2008)
NPSEC
-
-
Yu, S.1
Ren, K.2
Lou, W.3
-
13
-
-
44449129423
-
Predicate encryption supporting disjunctions, polynomial equations, and inner products
-
DOI 10.1007/978-3-540-78967-3-9, Advances in Cryptology - EUROCRYPT 2008 - 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
-
Katz, J., Sahai, A., Waters, B.: Predicate encryption supporting disjunctions, polynomial equations, and inner products. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 146-162. Springer, Heidelberg (2008) (Pubitemid 351762828)
-
(2008)
Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4965
, pp. 146-162
-
-
Katz, J.1
Sahai, A.2
Waters, B.3
-
14
-
-
79956000593
-
A2be: Accountable attribute-based encryption for abuse free access control
-
Li, J., Ren, K., Kim, K.: A2be: Accountable attribute-based encryption for abuse free access control. Cryptology ePrint Archive, Report 2009/118 (2009), http://eprint.iacr.org/
-
(2009)
Cryptology EPrint Archive, Report 2009/118
-
-
Li, J.1
Ren, K.2
Kim, K.3
-
15
-
-
79959578061
-
Privacy-aware attribute-based encryption with user accountability
-
Li, J., Ren, K., Zhu, B., Wan, Z.: Privacy-aware attribute-based encryption with user accountability. In: ISC (2009)
-
(2009)
ISC
-
-
Li, J.1
Ren, K.2
Zhu, B.3
Wan, Z.4
-
16
-
-
84874324906
-
Identity-based encryption from the weil pairing
-
Advances in Cryptology - CRYPTO 2001
-
Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213-229. Springer, Heidelberg (2001) (Pubitemid 33317917)
-
(2001)
Lecture Notes in Computer Science
, Issue.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
17
-
-
35048887476
-
Short group signatures
-
Franklin, M. (ed.) LNCS Springer, Heidelberg
-
Boneh, D., Boyen, X., Shacham, H.: Short group signatures. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 41-55. Springer, Heidelberg (2004)
-
(2004)
CRYPTO 2004
, vol.3152
, pp. 41-55
-
-
Boneh, D.1
Boyen, X.2
Shacham, H.3
-
18
-
-
70349682512
-
FDAC: Toward fine-grained distributed data access control in wireless sensor networks
-
Yu, S., Ren, K., Lou, W.: FDAC: Toward fine-grained distributed data access control in wireless sensor networks. In: IEEE INFOCOM (2009)
-
(2009)
IEEE INFOCOM
-
-
Yu, S.1
Ren, K.2
Lou, W.3
|