-
2
-
-
34548731375
-
-
IEEE Computer Society
-
J. Bethencourt, A. Sahai, and B. Waters, "Ciphertext-policy attributebased encryption," in Proc. S&P'07, 2007, pp. 321-334, IEEE Computer Society.
-
(2007)
Ciphertext-policy Attributebased Encryption in Proc. S&P'07
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
3
-
-
49049111604
-
Bounded ciphertext policy attribute based encryption
-
Springer
-
V.Goyal,A. Jain, O. Pandey, and A. Sahai, "Bounded ciphertext policy attribute based encryption," in Proc. ICALP'08, 2008, pp. 579-591, Springer.
-
(2008)
Proc. ICALP'08
, pp. 579-591
-
-
Jain, V.A.1
Pandey, O.2
Sahai, A.3
-
4
-
-
74049120601
-
Attribute-based encryption with non-monotonic access structures
-
ACM
-
R. Ostrovsky, A. Sahai, and B. Waters, "Attribute-based encryption with non-monotonic access structures," in Proc. CCS'07, 2007, pp. 195-203, ACM.
-
(2007)
Proc. CCS'07
, pp. 195-203
-
-
Ostrovsky, R.1
Sahai, A.2
Waters, B.3
-
5
-
-
79952521560
-
Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization
-
Springer
-
B. Waters, "Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization," in Proc. PKC'11, 2011, pp. 53-70, Springer.
-
Proc. PKC'11
, vol.2011
, pp. 53-70
-
-
Waters, B.1
-
6
-
-
77954635558
-
Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption
-
Springer
-
A. B. Lewko, T. Okamoto, A. Sahai, K. Takashima, and B. Waters, "Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption," in Proc. EUROCRYPT'10, 2010, pp. 62-91, Springer.
-
Proc. EUROCRYPT'10
, vol.2010
, pp. 62-91
-
-
Lewko, A.B.1
Okamoto, T.2
Sahai, A.3
Takashima, K.4
Waters, B.5
-
7
-
-
38049078557
-
Multi-authority attribute based encryption
-
Springer
-
M. Chase, "Multi-authority attribute based encryption," in Proc. TCC'07, 2007, pp. 515-534, Springer.
-
(2007)
Proc. TCC'07
, pp. 515-534
-
-
Chase, M.1
-
8
-
-
77952325912
-
Distributed attribute-based encryption
-
Springer
-
S.Müller, S. Katzenbeisser, and C. Eckert, "Distributed attribute-based encryption," in Proc. 11th Int. Conf. Information Security and Cryptology, 2008, pp. 20-36, Springer.
-
(2008)
Proc. 11th Int. Conf. Information Security and Cryptology
, pp. 20-36
-
-
Müller, S.1
Katzenbeisser, S.2
Eckert, C.3
-
9
-
-
74049163235
-
Improving privacy and security in multi-authority attribute-based encryption
-
ACM
-
M. Chase and S. S. M. Chow, "Improving privacy and security in multi-authority attribute-based encryption," in Proc. CCS'09, 2009, pp. 121-130, ACM.
-
(2009)
Proc. CCS'09
, pp. 121-130
-
-
Chase, M.1
Chow, S.S.M.2
-
10
-
-
79957993008
-
Decentralizing attribute-based encryption
-
Springer
-
A. B. Lewko and B. Waters, "Decentralizing attribute-based encryption," in Proc. EUROCRYPT'11, 2011, pp. 568-588, Springer.
-
Proc. EUROCRYPT'11
, vol.2011
, pp. 568-588
-
-
Lewko, A.B.1
Waters, B.2
-
11
-
-
85045009877
-
DAC-MACS: Effective data access control for multi-authority cloud storage systems
-
K. Yang, X. Jia, and K. Ren, "DAC-MACS: Effective Data Access Control for Multi-Authority Cloud Storage Systems," in Proc. INFOCOM' 13, 2013, pp. 2995-3003, IEEE.
-
(2014)
SpringerBriefs in Computer Science
, pp. 59-83
-
-
Yang, K.1
Jia, X.2
-
12
-
-
85076484262
-
Outsourcing the decryption of abe ciphertexts
-
USENIX Association
-
M. Green, S. Hohenberger, and B.Waters, "Outsourcing the decryption of abe ciphertexts," in Proc. 20th USENIX Security Symp., 2011, pp. 1-16, USENIX Association.
-
Proc. 20th USENIX Security Symp
, vol.2011
, pp. 1-16
-
-
Green, M.1
Hohenberger, S.2
Waters, B.3
-
13
-
-
79957585981
-
Attribute-based access control with efficient revocation in data outsourcing systems
-
Jul
-
J. Hur and D. K. Noh, "Attribute-based access control with efficient revocation in data outsourcing systems," IEEE Trans. Parallel Distrib. Syst., vol. 22, no. 7, pp. 1214-1221, Jul. 2011.
-
(2011)
IEEE Trans. Parallel Distrib. Syst
, vol.22
, Issue.7
, pp. 1214-1221
-
-
Hur, J.1
Noh, D.K.2
-
14
-
-
84856190480
-
DACC: Distributed access control in clouds
-
IEEE
-
S. Ruj, A. Nayak, and I. Stojmenovic, "DACC: Distributed Access Control in Clouds," in Proc. TrustCom'11, 2011, pp. 91-98, IEEE.
-
Proc. TrustCom'11
, vol.2011
, pp. 91-98
-
-
Ruj, S.1
Nayak, A.2
Stojmenovic, I.3
-
15
-
-
84883129994
-
DAC-MACS: Effective data access control for multi-authority cloud storage systems
-
K. Yang, X. Jia, and K. Ren, "DAC-MACS: Effective Data Access Control for Multi-Authority Cloud Storage Systems," IACR Cryptology ePrint Archive, vol. 419, pp. 1-12, 2012.
-
(2012)
IACR Cryptology EPrint Archive
, vol.419
, pp. 1-12
-
-
Yang, K.1
Jia, X.2
Ren, K.3
-
16
-
-
85033460636
-
Plutus: Scalable secure file sharing on untrusted storage
-
USENIX
-
M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu, "Plutus: Scalable secure file sharing on untrusted storage," in Proc. FAST'03, San Francisco, CA, USA, 2003, pp. 29-42, USENIX.
-
(2003)
Proc. FAST'03, San Francisco, CA, USA
, pp. 29-42
-
-
Kallahalla, M.1
Riedel, E.2
Swaminathan, R.3
Wang, Q.4
Fu, K.5
-
17
-
-
85033498470
-
Sirius: Securing remote untrusted storage
-
The Internet Society
-
E.-J. Goh, H. Shacham, N. Modadugu, and D. Boneh, "Sirius: Securing remote untrusted storage," in Proc. NDSS'03, 2003, pp. 131-145, The Internet Society.
-
(2003)
Proc. NDSS'03
, pp. 131-145
-
-
Goh, E.-J.1
Shacham, H.2
Modadugu, N.3
Boneh, D.4
-
18
-
-
0003387819
-
Revocation and tracing schemes for stateless receivers
-
D. Naor, M. Naor, and J. Lotspiech, "Revocation and tracing schemes for stateless receivers," in Proc. Electronic Colloquium on Computational Complexity (ECCC), 2002, pp. 41-62.
-
(2002)
Proc. Electronic Colloquium on Computational Complexity (ECCC)
, pp. 41-62
-
-
Naor, D.1
Naor, M.2
Lotspiech, J.3
-
19
-
-
74049110390
-
Patient controlled encryption: Ensuring privacy of electronic medical records
-
ACM
-
J. Benaloh, M. Chase, E. Horvitz, and K. Lauter, "Patient controlled encryption: Ensuring privacy of electronic medical records," in Proc. CCSW'09, 2009, pp. 103-114, ACM.
-
(2009)
Proc. CCSW'09
, pp. 103-114
-
-
Benaloh, J.1
Chase, M.2
Horvitz, E.3
Lauter, K.4
-
20
-
-
79959265831
-
Shared and searchable encrypted data for untrusted servers
-
C. Dong, G. Russello, and N. Dulay, "Shared and searchable encrypted data for untrusted servers," J. Comput. Security, vol. 19, no. 3, pp. 367-397, 2011.
-
(2011)
J. Comput. Security
, vol.19
, Issue.3
, pp. 367-397
-
-
Dong, C.1
Russello, G.2
Dulay, N.3
-
21
-
-
74049154660
-
Secure and efficient access to outsourced data
-
ACM
-
W.Wang, Z. Li, R. Owens, and B. K. Bhargava, "Secure and efficient access to outsourced data," in Proc. CCSW'09, 2009, pp. 55-66, ACM.
-
(2009)
Proc. CCSW'09
, pp. 55-66
-
-
Wang, W.1
Li, Z.2
Owens, R.3
Bhargava, B.K.4
-
22
-
-
24944554962
-
Fuzzy identity-based encryption
-
Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
-
A. Sahai and B. Waters, "Fuzzy identity-based encryption," in Proc. EUROCRYPT'05, 2005, pp. 457-473, Springer. (Pubitemid 41313969)
-
(2005)
Lecture Notes in Computer Science
, vol.3494
, pp. 457-473
-
-
Sahai, A.1
Waters, B.2
-
23
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
DOI 10.1145/1180405.1180418, 1180418, CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security
-
V. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attribute-based encryption for fine-grained access control of encrypted data," in Proc. CCS'06, 2006, pp. 89-98, ACM. (Pubitemid 47131359)
-
(2006)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
24
-
-
77954471010
-
Attribute based data sharing with attribute revocation
-
ACM
-
S. Yu, C. Wang, K. Ren, and W. Lou, "Attribute based data sharing with attribute revocation," in Proc. ASIACCS'10, 2010, pp. 261-270, ACM.
-
Proc. ASIACCS'10
, vol.2010
, pp. 261-270
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
-
25
-
-
79956030125
-
Easier: Encryption-based access control in social networks with efficient revocation
-
ACM
-
S. Jahid, P. Mittal, and N. Borisov, "Easier: Encryption-based access control in social networks with efficient revocation," in Proc. ASIACCS' 11, 2011, pp. 411-415, ACM.
-
(2011)
Proc. ASIACCS'
, vol.11
, pp. 411-415
-
-
Jahid, S.1
Mittal, P.2
Borisov, N.3
-
26
-
-
77950867637
-
Secure thresholdmulti authority attribute based encryption without a central authority
-
H. Lin, Z. Cao,X. Liang, and J. Shao, "Secure thresholdmulti authority attribute based encryption without a central authority," Inf. Sci., vol. 180, no. 13, pp. 2618-2632, 2010.
-
(2010)
Inf. Sci
, vol.180
, Issue.13
, pp. 2618-2632
-
-
Lin, H.1
Caox. Liang, Z.2
Shao, J.3
-
27
-
-
84988273293
-
Multi-authority ciphertext-policy attribute-based encryption with accountability
-
ACM
-
J. Li, Q. Huang, X. Chen, S. S. M. Chow, D. S. Wong, and D. Xie, "Multi-authority ciphertext-policy attribute-based encryption with accountability," in Proc. ASIACCS'11, 2011, pp. 386-390, ACM.
-
Proc. ASIACCS'11
, vol.2011
, pp. 386-390
-
-
Li, J.1
Huang, Q.2
Chen, X.3
Chow, S.S.M.4
Wong, D.S.5
Xie, D.6
-
28
-
-
84870885441
-
Scalable and secure sharing of personal health records in cloud computing using attributebased encryption
-
Jan
-
M. Li, S. Yu, Y. Zheng, K. Ren, and W. Lou, "Scalable and secure sharing of personal health records in cloud computing using attributebased encryption," IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 1, pp. 131-143, Jan. 2013.
-
(2013)
IEEE Trans. Parallel Distrib. Syst
, vol.24
, Issue.1
, pp. 131-143
-
-
Li, M.1
Yu, S.2
Zheng, Y.3
Ren, K.4
Lou, W.5
|