-
1
-
-
85020598353
-
Identity-based cryptosystems and signature schemes, Proc
-
Springer-Verlag, Berlin
-
A. Shamir, Identity-based cryptosystems and signature schemes, Proc. CRYPTO'84, LNCS 196, Springer-Verlag, Berlin (1985), pp. 47-53
-
(1985)
CRYPTO'84, LNCS 196
, pp. 47-53
-
-
Shamir, A.1
-
2
-
-
84874324906
-
Identity-based encryption from the Weil Pairing
-
Springer-Verlag, Berlin
-
D. Boneh and M. Franklin, Identity-based encryption from the Weil Pairing, Proc. CRYPTO 2001, LNCS 2139, Springer-Verlag, Berlin (2001), pp. 213-229
-
(2001)
Proc. CRYPTO 2001, LNCS 2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
3
-
-
77950151506
-
An identity based encryption scheme based on quadratic residues
-
Springer-Verlag Berlin
-
C. Cocks, An identity based encryption scheme based on quadratic residues, Proc. IMA Int. Conf. Cryptography and Coding 2001, LNCS 2260, Springer-Verlag, Berlin (2001), pp. 360-363
-
(2001)
Proc. IMA Int. Conf. Cryptography and Coding 2001, LNCS 2260
, pp. 360-363
-
-
Cocks, C.1
-
4
-
-
24944554962
-
Fuzzy identity-based encryption
-
Springer-Verlag, Berlin
-
A. Sahai and B. Waters, Fuzzy identity-based encryption, Proc. EUROCRYPT 2005, LNCS 3494, Springer-Verlag, Berlin (2005), pp. 457-473
-
(2005)
Proc. EUROCRYPT 2005, LNCS 3494
, pp. 457-473
-
-
Sahai, A.1
Waters, B.2
-
5
-
-
34547273527
-
Attribute-based encryption for ̄negrained access control of encrypted data
-
V. Goyal, O. Pandey, A. Sahai and B. Waters, Attribute-based encryption for ̄negrained access control of encrypted data, Proc. 13th ACM Conf. Computer and Communications Security (CCS'06) (2006), pp. 89-98
-
(2006)
Proc. 13th ACM Conf. Computer and Communications Security (CCS'06
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
6
-
-
77957150308
-
-
M. Pirretti, P. Traynor, P. McDaniel and B. Waters, Secure attribute-based systems, J. Comput. Sec. 18 (2010) 799-837
-
(2010)
Secure Attribute-Based Systems J. Comput. Sec
, vol.18
, pp. 799-837
-
-
Pirretti, M.1
Traynor, P.2
McDaniel, P.3
Waters, B.4
-
7
-
-
44449129423
-
Predicate encryption supporting disjunctions polynomial equations
-
Springer-Verlag Berlin
-
J. Katz, A. Sahai and B. Waters, Predicate encryption supporting disjunctions, polynomial equations, and inner products, Proc. EUROCRYPT 2008, LNCS 4965, Springer-Verlag, Berlin (2008), pp. 146-162
-
(2008)
And Inner Products, Proc. EUROCRYPT 2008, LNCS 4965
, pp. 146-162
-
-
Katz, J.1
Sahai, A.2
Waters, B.3
-
8
-
-
79953230454
-
Functional encryption: Dēnitions and challenges
-
Springer-Verlag Berlin
-
D. Boneh, A. Sahai and B. Waters, Functional encryption: Dēnitions and challenges, Proc. 8th Theory of Cryptography Conference (TCC'11), LNCS 6597, Springer-Verlag, Berlin (2011), pp. 253-273
-
(2011)
Proc. 8th Theory of Cryptography Conference (TCC'11), LNCS 6597
, pp. 253-273
-
-
Boneh, D.1
Sahai, A.2
Waters, B.3
-
9
-
-
34748851940
-
New constructions of fuzzy identity-based encryption
-
J. Baek, W. Susilo and J. Zhou, New constructions of fuzzy identity-based encryption, Proc. 2nd ACM Symp. Information, Computer and Communications Security (ASIACCS'07) (2007), pp. 368-370
-
(2007)
Proc. 2nd ACM Symp. Information, Computer and Communications Security (ASIACCS'07
, pp. 368-370
-
-
Baek, J.1
Susilo, W.2
Zhou, J.3
-
10
-
-
78650287972
-
New fuzzy identity-based encryption in the standard model
-
Y. Ren, D. Gu, S. Wang and X. Zhang, New fuzzy identity-based encryption in the standard model, Informatica 21 (2010) 393-407.
-
(2010)
Informatica
, vol.21
, pp. 393-407
-
-
Ren, Y.1
Gu, D.2
Wang, S.3
Zhang, X.4
|