-
1
-
-
84870632681
-
Charm: A framework for rapidly prototyping cryptosystems
-
Report 2011/617
-
Joseph A. Akinyele, Matthew Green, and Avi Rubin. Charm: A framework for rapidly prototyping cryptosystems. Cryptology ePrint Archive, Report 2011/617, 2011. http://eprint.iacr.org/.
-
(2011)
Cryptology ePrint Archive
-
-
Akinyele, J.A.1
Green, M.2
Rubin, A.3
-
2
-
-
33749033076
-
Escrow-free encryption supporting cryptographic workflow
-
Sattam S. Al-Riyami, John Malone-Lee, and Nigel P. Smart. Escrow-free encryption supporting cryptographic workflow. Int. J. Inf. Sec., 5(4):217-229, 2006.
-
(2006)
Int. J. Inf. Sec.
, vol.5
, Issue.4
, pp. 217-229
-
-
Al-Riyami, S.S.1
Malone-Lee, J.2
Smart, N.P.3
-
3
-
-
34247329524
-
Policy-based encryption schemes from bilinear pairings
-
Walid Bagga, Refik Molva, and Stefano Crosta. Policy-based encryption schemes from bilinear pairings. In ASIACCS, page 368, 2006.
-
(2006)
ASIACCS
, pp. 368
-
-
Bagga, W.1
Molva, R.2
Crosta, S.3
-
4
-
-
84973899018
-
Secure cryptographic workflow in the standard model
-
Manuel Barbosa and Pooya Farshim. Secure cryptographic workflow in the standard model. In INDOCRYPT, pages 379-393, 2006.
-
(2006)
INDOCRYPT
, pp. 379-393
-
-
Barbosa, M.1
Farshim, P.2
-
7
-
-
35048841300
-
Efficient selective-id secure identity-based encryption without random oracles
-
Dan Boneh and Xavier Boyen. Efficient selective-id secure identity-based encryption without random oracles. In EUROCRYPT, pages 223-238, 2004.
-
(2004)
EUROCRYPT
, pp. 223-238
-
-
Boneh, D.1
Boyen, X.2
-
8
-
-
84874324906
-
Identity-based encryption from the Weil pairing
-
Dan Boneh and Matthew K. Franklin. Identity-based encryption from the Weil pairing. In CRYPTO, pages 213-229, 2001.
-
(2001)
CRYPTO
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.K.2
-
9
-
-
43149116953
-
Space-efficient identity based encryption without pairings
-
Dan Boneh, Craig Gentry, and Michael Hamburg. Space-efficient identity based encryption without pairings. In FOCS, pages 647-657, 2007.
-
(2007)
FOCS
, pp. 647-657
-
-
Boneh, D.1
Gentry, C.2
Hamburg, M.3
-
10
-
-
79953230454
-
Functional encryption: Definitions and challenges
-
Dan Boneh, Amit Sahai, and Brent Waters. Functional encryption: Definitions and challenges. In TCC, pages 253-273, 2011.
-
(2011)
TCC
, pp. 253-273
-
-
Boneh, D.1
Sahai, A.2
Waters, B.3
-
12
-
-
84888984299
-
-
Charm. http://www.charm-crypto.com.
-
-
-
-
13
-
-
38049078557
-
Multi-authority attribute based encryption
-
Melissa Chase. Multi-authority attribute based encryption. In TCC, pages 515-534, 2007.
-
(2007)
TCC
, pp. 515-534
-
-
Chase, M.1
-
14
-
-
74049163235
-
Improving privacy and security in multi-authority attribute-based encryption
-
Melissa Chase and Sherman S. M. Chow. Improving privacy and security in multi-authority attribute-based encryption. In ACM Conference on Computer and Communications Security, pages 121-130, 2009.
-
(2009)
ACM Conference on Computer and Communications Security
, pp. 121-130
-
-
Chase, M.1
Chow, S.S.M.2
-
16
-
-
77950151506
-
An identity based encryption scheme based on quadratic residues
-
Clifford Cocks. An identity based encryption scheme based on quadratic residues. In IMA Int. Conf., pages 360-363, 2001.
-
(2001)
IMA Int. Conf.
, pp. 360-363
-
-
Cocks, C.1
-
17
-
-
77954639466
-
Converting pairing-based cryptosystems from composite-order groups to prime-order groups
-
David Mandell Freeman. Converting pairing-based cryptosystems from composite-order groups to prime-order groups. In EUROCRYPT, pages 44-61, 2010.
-
(2010)
EUROCRYPT
, pp. 44-61
-
-
Freeman, D.M.1
-
18
-
-
33746062799
-
Practical identity-based encryption without random oracles
-
Craig Gentry. Practical identity-based encryption without random oracles. In EUROCRYPT, pages 445-464, 2006.
-
(2006)
EUROCRYPT
, pp. 445-464
-
-
Gentry, C.1
-
19
-
-
49049111604
-
Bounded ciphertext policy attribute based encryption
-
Vipul Goyal, Abhishek Jain, Omkant Pandey, and Amit Sahai. Bounded ciphertext policy attribute based encryption. In ICALP (2), pages 579-591, 2008.
-
(2008)
ICALP (2)
, pp. 579-591
-
-
Goyal, V.1
Jain, A.2
Pandey, O.3
Sahai, A.4
-
20
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
Vipul Goyal, Omkant Pandey, Amit Sahai, and Brent Waters. Attribute-based encryption for fine-grained access control of encrypted data. In ACM Conference on Computer and Communications Security, pages 89-98, 2006.
-
(2006)
ACM Conference on Computer and Communications Security
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
21
-
-
44449129423
-
Predicate encryption supporting disjunctions, polynomial equations, and inner products
-
Jonathan Katz, Amit Sahai, and Brent Waters. Predicate encryption supporting disjunctions, polynomial equations, and inner products. In EUROCRYPT, pages 146-162, 2008.
-
(2008)
EUROCRYPT
, pp. 146-162
-
-
Katz, J.1
Sahai, A.2
Waters, B.3
-
22
-
-
84859952520
-
Tools for simulating features of composite order bilinear groups in the prime order setting
-
Allison B. Lewko. Tools for simulating features of composite order bilinear groups in the prime order setting. In EUROCRYPT, pages 318-335, 2012.
-
(2012)
EUROCRYPT
, pp. 318-335
-
-
Lewko, A.B.1
-
23
-
-
77954635558
-
Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption
-
Allison B. Lewko, Tatsuaki Okamoto, Amit Sahai, Katsuyuki Takashima, and Brent Waters. Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption. In EUROCRYPT, pages 62-91, 2010.
-
(2010)
EUROCRYPT
, pp. 62-91
-
-
Lewko, A.B.1
Okamoto, T.2
Sahai, A.3
Takashima, K.4
Waters, B.5
-
24
-
-
79957993008
-
Decentralizing attribute-based encryption
-
Allison B. Lewko and Brent Waters. Decentralizing attribute-based encryption. In EUROCRYPT, pages 568-588, 2011.
-
(2011)
EUROCRYPT
, pp. 568-588
-
-
Lewko, A.B.1
Waters, B.2
-
25
-
-
79958006339
-
Unbounded HIBE and attribute-based encryption
-
Allison B. Lewko and Brent Waters. Unbounded HIBE and attribute-based encryption. In EUROCRYPT, pages 547-567, 2011.
-
(2011)
EUROCRYPT
, pp. 547-567
-
-
Lewko, A.B.1
Waters, B.2
-
26
-
-
84865479255
-
New proof methods for attribute-based encryption: Achieving full security through selective techniques
-
Allison B. Lewko and Brent Waters. New proof methods for attribute-based encryption: Achieving full security through selective techniques. In CRYPTO, pages 180-198, 2012.
-
(2012)
CRYPTO
, pp. 180-198
-
-
Lewko, A.B.1
Waters, B.2
-
28
-
-
85009120801
-
Controlling access to published data using cryptography
-
Gerome Miklau and Dan Suciu. Controlling access to published data using cryptography. In VLDB, pages 898-909, 2003.
-
(2003)
VLDB
, pp. 898-909
-
-
Miklau, G.1
Suciu, D.2
-
29
-
-
84959046713
-
Characterization of elliptic curve traces under fr-reduction
-
Atsuko Miyaji, Masaki Nakabayashi, and Shunzo Takano. Characterization of elliptic curve traces under fr-reduction. In ICISC, pages 90-108, 2000.
-
(2000)
ICISC
, pp. 90-108
-
-
Miyaji, A.1
Nakabayashi, M.2
Takano, S.3
-
30
-
-
52149087229
-
Homomorphic encryption and signatures from vector decomposition
-
Tatsuaki Okamoto and Katsuyuki Takashima. Homomorphic encryption and signatures from vector decomposition. In Pairing, pages 57-74, 2008.
-
(2008)
Pairing
, pp. 57-74
-
-
Okamoto, T.1
Takashima, K.2
-
31
-
-
72449208663
-
Hierarchical predicate encryption for inner-products
-
Tatsuaki Okamoto and Katsuyuki Takashima. Hierarchical predicate encryption for inner-products. In ASIACRYPT, pages 214-231, 2009.
-
(2009)
ASIACRYPT
, pp. 214-231
-
-
Okamoto, T.1
Takashima, K.2
-
32
-
-
77957011503
-
Fully secure functional encryption with general relations from the decisional linear assumption
-
Tatsuaki Okamoto and Katsuyuki Takashima. Fully secure functional encryption with general relations from the decisional linear assumption. In CRYPTO, pages 191-208, 2010.
-
(2010)
CRYPTO
, pp. 191-208
-
-
Okamoto, T.1
Takashima, K.2
-
33
-
-
84871604439
-
Fully secure unbounded inner-product and attribute-based encryption
-
Tatsuaki Okamoto and Katsuyuki Takashima. Fully secure unbounded inner-product and attribute-based encryption. In ASIACRYPT, pages 349-366, 2012.
-
(2012)
ASIACRYPT
, pp. 349-366
-
-
Okamoto, T.1
Takashima, K.2
-
35
-
-
34547325357
-
Secure attribute-based systems
-
Matthew Pirretti, Patrick Traynor, Patrick McDaniel, and Brent Waters. Secure attribute-based systems. In ACM Conference on Computer and Communications Security, pages 99-112, 2006.
-
(2006)
ACM Conference on Computer and Communications Security
, pp. 99-112
-
-
Pirretti, M.1
Traynor, P.2
McDaniel, P.3
Waters, B.4
-
36
-
-
24944554962
-
Fuzzy identity-based encryption
-
Amit Sahai and Brent Waters. Fuzzy identity-based encryption. In EUROCRYPT, pages 457-473, 2005.
-
(2005)
EUROCRYPT
, pp. 457-473
-
-
Sahai, A.1
Waters, B.2
-
37
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Adi Shamir. Identity-based cryptosystems and signature schemes. In CRYPTO, pages 47-53, 1984.
-
(1984)
CRYPTO
, pp. 47-53
-
-
Shamir, A.1
-
38
-
-
70350649061
-
Predicate privacy in encryption systems
-
Emily Shen, Elaine Shi, and Brent Waters. Predicate privacy in encryption systems. In TCC, pages 457-473, 2009.
-
(2009)
TCC
, pp. 457-473
-
-
Shen, E.1
Shi, E.2
Waters, B.3
-
39
-
-
49049104392
-
Delegating capabilities in predicate encryption systems
-
Elaine Shi and Brent Waters. Delegating capabilities in predicate encryption systems. In ICALP (2), pages 560-578, 2008.
-
(2008)
ICALP (2)
, pp. 560-578
-
-
Shi, E.1
Waters, B.2
-
40
-
-
35248891001
-
Access control using pairing based cryptography
-
Nigel P. Smart. Access control using pairing based cryptography. In CT-RSA, pages 111-121, 2003.
-
(2003)
CT-RSA
, pp. 111-121
-
-
Smart, N.P.1
-
42
-
-
24944566040
-
Efficient identity-based encryption without random oracles
-
Brent Waters. Efficient identity-based encryption without random oracles. In EUROCRYPT, pages 114-127, 2005.
-
(2005)
EUROCRYPT
, pp. 114-127
-
-
Waters, B.1
-
43
-
-
79952521560
-
Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization
-
Brent Waters. Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization. In Public Key Cryptography, pages 53-70, 2011.
-
(2011)
Public Key Cryptography
, pp. 53-70
-
-
Waters, B.1
|