-
1
-
-
38149038702
-
On privacy models for RFID
-
S. Vaudenay, "On privacy models for RFID," in Proc. ASIACRYPT, 2007, vol. 4833, pp. 68-87.
-
(2007)
Proc. ASIACRYPT
, vol.4833
, pp. 68-87
-
-
Vaudenay, S.1
-
2
-
-
57949110628
-
Identity-based broadcast encryption with constant size ciphertexts and private keys
-
C. Delerablée, "Identity-based broadcast encryption with constant size ciphertexts and private keys," in Proc. ASIACRYPT, 2007, vol. 4833, pp. 200-215.
-
(2007)
Proc. ASIACRYPT
, vol.4833
, pp. 200-215
-
-
Delerablée, C.1
-
3
-
-
84865578457
-
Identity-based traitor tracing with short private key and short ciphertext
-
F. Guo, Y. Mu, and W. Susilo, "Identity-based traitor tracing with short private key and short ciphertext," in Proc. ESORICS, 2012, vol. 7459, pp. 609-626.
-
(2012)
Proc. ESORICS
, vol.7459
, pp. 609-626
-
-
Guo, F.1
Mu, Y.2
Susilo, W.3
-
4
-
-
50049123113
-
Identity-based encryption: How to decrypt multiple ciphertexts using a single decryption key
-
F. Guo, Y. Mu, and Z. Chen, "Identity-based encryption: How to decrypt multiple ciphertexts using a single decryption key," in Proc. Pairing, 2007, vol. 4575, pp. 392-406.
-
(2007)
Proc. Pairing
, vol.4575
, pp. 392-406
-
-
Guo, F.1
Mu, Y.2
Chen, Z.3
-
5
-
-
54249167139
-
Multi-identity single-key decryption without random oracles
-
F. Guo, Y. Mu, Z. Chen, and L. Xu, "Multi-identity single-key decryption without random oracles," in Proc. Inscrypt, 2007, vol. 4990, pp. 384-398.
-
(2007)
Proc. Inscrypt
, vol.4990
, pp. 384-398
-
-
Guo, F.1
Mu, Y.2
Chen, Z.3
Xu, L.4
-
6
-
-
84876828726
-
Efficient and dynamic key management for multiple identities in identity-based systems
-
Feb.
-
H. Guo, C. Xu, Z. Li, Y. Yao, and Y. Mu, "Efficient and dynamic key management for multiple identities in identity-based systems," Inf. Sci., vol. 221, pp. 579-590, Feb. 2013.
-
(2013)
Inf. Sci.
, vol.221
, pp. 579-590
-
-
Guo, H.1
Xu, C.2
Li, Z.3
Yao, Y.4
Mu, Y.5
-
7
-
-
84874324906
-
Identity-Based Encryption from the Weil Pairing
-
Advances in Cryptology - CRYPTO 2001
-
D. Boneh and M. K. Franklin, "Identity-based encryption from the weil pairing," in Proc. CRYPTO, 2001, vol. 2139, pp. 213-229. (Pubitemid 33317917)
-
(2001)
Lecture Notes in Computer Science
, Issue.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
8
-
-
78649998200
-
Hierarchical attribute-based encryption for fine-grained access control in cloud storage services
-
G. Wang, Q. Liu, and J. Wu, "Hierarchical attribute-based encryption for fine-grained access control in cloud storage services," in Proc. ACM Conf. Comput. Commun. Security, 2010, pp. 735-737.
-
(2010)
Proc. ACM Conf. Comput. Commun. Security
, pp. 735-737
-
-
Wang, G.1
Liu, Q.2
Wu, J.3
-
9
-
-
79957585981
-
Attribute-based access control with efficient revocation in data outsourcing systems,"
-
Jul.
-
J. Hur and D. K. Noh, "Attribute-based access control with efficient revocation in data outsourcing systems," IEEE Trans. Parallel Distrib. Syst., vol. 22, no. 7, pp. 1214-1221, Jul. 2011.
-
(2011)
IEEE Trans. Parallel Distrib. Syst.
, vol.22
, Issue.7
, pp. 1214-1221
-
-
Hur, J.1
Noh, D.K.2
-
10
-
-
84863392301
-
Hasbe: A hierarchical attributebased solution for flexible and scalable access control in cloud computing,"
-
Apr.
-
Z. Wan, J. Liu, and R. H. Deng, "Hasbe: A hierarchical attributebased solution for flexible and scalable access control in cloud computing," IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 743-754, Apr. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.2
, pp. 743-754
-
-
Wan, Z.1
Liu, J.2
Deng, R.H.3
-
11
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
DOI 10.1145/1180405.1180418, 1180418, CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security
-
V. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attribute-based encryption for fine-grained access control of encrypted data," in Proc. ACM Conf. Comput. Commun. Security, 2006, pp. 89-98. (Pubitemid 47131359)
-
(2006)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
12
-
-
34548731375
-
Ciphertext-policy attributebased encryption
-
May
-
J. Bethencourt, A. Sahai, and B. Waters, "Ciphertext-policy attributebased encryption," in Proc. IEEE Symp. Security Privacy, May 2007, pp. 321-334.
-
(2007)
Proc. IEEE Symp. Security Privacy
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
14
-
-
79952521560
-
Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization
-
B. Waters, "Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization," in Proc. Public Key Cryptograph., 2011, vol. 6571, pp. 53-70.
-
(2011)
Proc. Public Key Cryptograph.
, vol.6571
, pp. 53-70
-
-
Waters, B.1
-
15
-
-
70350635850
-
A ciphertext-policy attribute-based encryption scheme with constant ciphertext length
-
K. Emura, A. Miyaji, A. Nomura, K. Omote, and M. Soshi, "A ciphertext-policy attribute-based encryption scheme with constant ciphertext length," in Proc. ISPEC, 2009, vol. 5451, pp. 13-23.
-
(2009)
Proc. ISPEC
, vol.5451
, pp. 13-23
-
-
Emura, K.1
Miyaji, A.2
Nomura, A.3
Omote, K.4
Soshi, M.5
-
16
-
-
78650001392
-
On efficient ciphertext-policy attribute based encryption and broadcast encryption: Extended abstract
-
Z. Zhou and D. Huang, "On efficient ciphertext-policy attribute based encryption and broadcast encryption: Extended abstract," in Proc. ACM Conf. Comput. Commun. Security, 2010, pp. 753-755.
-
(2010)
Proc. ACM Conf. Comput. Commun. Security
, pp. 753-755
-
-
Zhou, Z.1
Huang, D.2
-
17
-
-
79952523217
-
Constant size ciphertexts in threshold attribute-based encryption
-
J. Herranz, F. Laguillaumie, and C. Ràfols, "Constant size ciphertexts in threshold attribute-based encryption," in Proc. Public Key Cryptography, 2010, vol. 6056, pp. 19-34.
-
(2010)
Proc. Public Key Cryptography
, vol.6056
, pp. 19-34
-
-
Herranz, J.1
Laguillaumie, F.2
Ràfols, C.3
-
18
-
-
77954635558
-
Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption
-
A. B. Lewko, T. Okamoto, A. Sahai, K. Takashima, and B. Waters, "Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption," in Proc. EUROCRYPT, 2010, vol. 6110, pp. 62-91.
-
(2010)
Proc. EUROCRYPT
, vol.6110
, pp. 62-91
-
-
Lewko, A.B.1
Okamoto, T.2
Sahai, A.3
Takashima, K.4
Waters, B.5
-
19
-
-
84865479255
-
New proof methods for attribute-based encryption: Achieving full security through selective techniques
-
A. B. Lewko and B. Waters, "New proof methods for attribute-based encryption: Achieving full security through selective techniques," in Proc. CRYPTO, 2012, vol. 7417, pp. 180-198.
-
(2012)
Proc. CRYPTO
, vol.7417
, pp. 180-198
-
-
Lewko, A.B.1
Waters, B.2
-
20
-
-
24944554962
-
Fuzzy identity-based encryption
-
Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
-
A. Sahai and B. Waters, "Fuzzy identity-based encryption," in Proc. EUROCRYPT, 2005, vol. 3494, pp. 457-473. (Pubitemid 41313969)
-
(2005)
Lecture Notes in Computer Science
, vol.3494
, pp. 457-473
-
-
Sahai, A.1
Waters, B.2
-
21
-
-
74049120601
-
Attribute-based encryption with non-monotonic access structures
-
R. Ostrovsky, A. Sahai, and B. Waters, "Attribute-based encryption with non-monotonic access structures," in Proc. ACM Conf. Comput. Commun. Security, 2007, pp. 195-203.
-
(2007)
Proc. ACM Conf. Comput. Commun. Security
, pp. 195-203
-
-
Ostrovsky, R.1
Sahai, A.2
Waters, B.3
-
22
-
-
84874307015
-
Fully secure attribute-based systems with short ciphertexts/signatures and threshold access structures
-
C. Chen et al., "Fully secure attribute-based systems with short ciphertexts/signatures and threshold access structures," in Proc. CT-RSA, 2013, vol. 7779, pp. 50-67.
-
(2013)
Proc. CT-RSA
, vol.7779
, pp. 50-67
-
-
Chen1
Et Al., C.2
-
23
-
-
79952510987
-
Expressive key-policy attribute-based encryption with constant-size ciphertexts
-
N. Attrapadung, B. Libert, and E. de Panafieu, "Expressive key-policy attribute-based encryption with constant-size ciphertexts," in Proc. Public Key Cryptograph., 2011, vol. 6571, pp. 90-108.
-
(2011)
Proc. Public Key Cryptograph.
, vol.6571
, pp. 90-108
-
-
Attrapadung, N.1
Libert, B.2
De Panafieu, E.3
-
24
-
-
80053159200
-
Efficient ciphertext policy attribute-based encryption with constant-size ciphertext and constant computation-cost
-
C. Chen, Z. Zhang, and D. Feng, "Efficient ciphertext policy attribute-based encryption with constant-size ciphertext and constant computation-cost," in Proc. ProvSec, 2011, vol. 6980, pp. 84-101.
-
(2011)
Proc. ProvSec
, vol.6980
, pp. 84-101
-
-
Chen, C.1
Zhang, Z.2
Feng, D.3
-
25
-
-
84864803494
-
Threshold ciphertext policy attribute-based encryption with constant size ciphertexts
-
A. Ge, R. Zhang, C. Chen, C. Ma, and Z. Zhang, "Threshold ciphertext policy attribute-based encryption with constant size ciphertexts," in Proc. ACISP, 2012, vol. 7372, pp. 336-349.
-
(2012)
Proc. ACISP
, vol.7372
, pp. 336-349
-
-
Ge, A.1
Zhang, R.2
Chen, C.3
Ma, C.4
Zhang, Z.5
-
26
-
-
84871604439
-
Fully secure unbounded inner-product and attribute-based encryption
-
T. Okamoto and K. Takashima, "Fully secure unbounded inner-product and attribute-based encryption," in Proc. ASIACRYPT, 2012, vol. 7658, pp. 349-366.
-
(2012)
Proc. ASIACRYPT
, vol.7658
, pp. 349-366
-
-
Okamoto, T.1
Takashima, K.2
-
27
-
-
49049111604
-
Bounded ciphertext policy attribute based encryption
-
V. Goyal, A. Jain, O. Pandey, and A. Sahai, "Bounded ciphertext policy attribute based encryption," in Proc. 35th ICALP, 2008, vol. 5126, pp. 579-591.
-
(2008)
Proc. 35th ICALP
, vol.5126
, pp. 579-591
-
-
Goyal, V.1
Jain, A.2
Pandey, O.3
Sahai, A.4
-
28
-
-
84898821676
-
Attribute-based encryption for circuits from multilinear maps
-
abs/1210.5287
-
A. Sahai and B. Waters, "Attribute-based encryption for circuits from multilinear maps," CoRR, vol. abs/1210.5287, 2012.
-
(2012)
CoRR
-
-
Sahai, A.1
Waters, B.2
-
29
-
-
38049078557
-
Multi-authority attribute based encryption
-
M. Chase, "Multi-authority attribute based encryption," in Proc. TCC, 2007, vol. 4392, pp. 515-534.
-
(2007)
Proc. TCC
, vol.4392
, pp. 515-534
-
-
Chase, M.1
-
30
-
-
45749094622
-
Attribute-based encryption with partially hidden encryptor-specified access structures
-
T. Nishide, K. Yoneyama, and K. Ohta, "Attribute-based encryption with partially hidden encryptor-specified access structures," in Proc. ACNS, 2008, vol. 5037, pp. 111-129.
-
(2008)
Proc. ACNS
, vol.5037
, pp. 111-129
-
-
Nishide, T.1
Yoneyama, K.2
Ohta, K.3
-
31
-
-
84873974141
-
Attribute-based encryption with fast decryption
-
S. Hohenberger and B. Waters, "Attribute-based encryption with fast decryption," in Proc. Public Key Cryptograph., 2013, vol. 7778, pp. 162-179.
-
(2013)
Proc. Public Key Cryptograph.
, vol.7778
, pp. 162-179
-
-
Hohenberger, S.1
Waters, B.2
-
32
-
-
84863401953
-
Attribute-based encryption without key cloning
-
M. J. Hinek, S. Jiang, R. Safavi-Naini, and S. F. Shahandashti, "Attribute-based encryption without key cloning," IJACT, vol. 2, no. 3, pp. 250-270, 2012.
-
(2012)
IJACT
, vol.2
, Issue.3
, pp. 250-270
-
-
Hinek, M.J.1
Jiang, S.2
Safavi-Naini, R.3
Shahandashti, S.F.4
-
33
-
-
84872101907
-
White-box traceable ciphertext-policy attribute-based encryption supporting any monotone access structures
-
Jan.
-
Z. Liu, Z. Cao, and D. Wong, "White-box traceable ciphertext-policy attribute-based encryption supporting any monotone access structures," IEEE Trans. Inf. Forensics Security, vol. 8, no. 1, pp. 76-88, Jan. 2013.
-
(2013)
IEEE Trans. Inf. Forensics Security
, vol.8
, Issue.1
, pp. 76-88
-
-
Liu, Z.1
Cao, Z.2
Wong, D.3
-
34
-
-
84955339164
-
Secure integration of asymmetric and symmetric encryption schemes
-
E. Fujisaki and T. Okamoto, "Secure integration of asymmetric and symmetric encryption schemes," in Proc. CRYPTO, 1999, vol. 1666, pp. 537-554.
-
(1999)
Proc. CRYPTO
, vol.1666
, pp. 537-554
-
-
Fujisaki, E.1
Okamoto, T.2
-
35
-
-
73849107877
-
A taxonomy of pairing-friendly elliptic curves
-
Freeman, M. Scott, E. Teske
-
D. Freeman, M. Scott, and E. Teske, "A taxonomy of pairing-friendly elliptic curves," J. Cryptol., vol. 23, no. 2, pp. 224-280, 2010.
-
(2010)
J. Cryptol.
, vol.23
, Issue.2
, pp. 224-280
-
-
|