-
1
-
-
85184300816
-
Securing electronic medical records using attribute-based encryption on mobile devices
-
October 17, Chicago, Illinois, USA
-
J. A. Akinyele, C. U. Lehmann, M. D. Green, M. W. Pagano, Z. N. J. Peterson, and A. D. Rubin. Securing Electronic Medical Records Using Attribute-Based Encryption On Mobile Devices. SPSM'11, October 17, 2011, Chicago, Illinois, USA.
-
(2011)
SPSM'11
-
-
Akinyele, J.A.1
Lehmann, C.U.2
Green, M.D.3
Pagano, M.W.4
Peterson, Z.N.J.5
Rubin, A.D.6
-
4
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
T. ElGamal, "A public key cryptosystem and a signature scheme based on discrete logarithms", IEEE Transactions on Information Theory, 31: 469-472, 1985.
-
(1985)
IEEE Transactions on Information Theory
, vol.31
, pp. 469-472
-
-
Elgamal, T.1
-
5
-
-
20444507015
-
Universal re-encryption for mixnets
-
P. Golle, M. Jakobsson, A. Juels, P. Syverson, Universal re-encryption for mixnets, in: Proceedings of the CT-RSA'04, 2004, pp. 163178.
-
(2004)
Proceedings of the CT-RSA'04
, pp. 163178
-
-
Golle, P.1
Jakobsson, M.2
Juels, A.3
Syverson, P.4
-
6
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
V. Goyal, O. Pandey, A. Sahai, and B. Waters. Attribute-based encryption for fine-grained access control of encrypted data. In ACM CCS'06, pp. 89-98, 2006.
-
(2006)
ACM CCS'06
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
8
-
-
80755167409
-
Mediated ciphertext-policy attribute-based encryption and its application
-
L. Ibraimi, M. Petkovic, S. Nikova, P. Hartel, and W. Jonker. Mediated ciphertext-policy attribute-based encryption and its application. In WISA, 2009.
-
(2009)
WISA
-
-
Ibraimi, L.1
Petkovic, M.2
Nikova, S.3
Hartel, P.4
Jonker, W.5
-
9
-
-
0002920278
-
Mix and match: Secure function evaluation via ciphertexts
-
M. Jakobsson, A. Juels, Mix and match: secure function evaluation via ciphertexts, in: Proceedings of the Asiacrypt'00, 2000, pp. 162177.
-
(2000)
Proceedings of the Asiacrypt'00
, pp. 162177
-
-
Jakobsson, M.1
Juels, A.2
-
10
-
-
84864536476
-
Unbounded hibe and attribute-based encryption
-
A. B. Lewko and B. Waters. Unbounded hibe and attribute-based encryption. In EUROCRYPT, 2011.
-
(2011)
EUROCRYPT
-
-
Lewko, A.B.1
Waters, B.2
-
11
-
-
84937438236
-
Threshold passwordauthenticated key exchange
-
M. Yung, editor
-
P. MacKenzie, T. Shrimpton, and M. Jakobsson. Threshold passwordauthenticated key exchange. In M. Yung, editor, CRYPTO'02, pages 385-400, 2002.
-
(2002)
CRYPTO'02
, pp. 385-400
-
-
Mackenzie, P.1
Shrimpton, T.2
Jakobsson, M.3
-
13
-
-
78650118369
-
Privacy preserving ehr system using attribute-based infrastructure
-
S. Narayan, M. Gagne, and R. Safavi-Naini. Privacy preserving ehr system using attribute-based infrastructure. In ACM CCSW, 2010.
-
(2010)
ACM CCSW
-
-
Narayan, S.1
Gagne, M.2
Safavi-Naini, R.3
-
14
-
-
84927727752
-
Security proofs for signature schemes
-
D. Pointcheval and J. Stern, "Security proofs for signature schemes", in Proc. EUROCRYPT'96, pages 387-398, 1996.
-
(1996)
Proc. EUROCRYPT'96
, pp. 387-398
-
-
Pointcheval, D.1
Stern, J.2
-
15
-
-
33645998872
-
Fuzzy identity based encryption
-
A. Sahai and B. Waters. Fuzzy identity based encryption. In Eurocrypt 2005.
-
(2005)
Eurocrypt
-
-
Sahai, A.1
Waters, B.2
-
16
-
-
84958979582
-
On the security of ElGamal based encryption
-
Y. Tsiounis and M. Yung, "On the security of ElGamal based encryption", in Proc. PKC'98, pages 117-134, 1998.
-
(1998)
Proc. PKC'98
, pp. 117-134
-
-
Tsiounis, Y.1
Yung, M.2
-
17
-
-
79952521560
-
Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization
-
B. Waters. Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. PKC'11, Pages 53-70, 2011.
-
(2011)
PKC'11
, pp. 53-70
-
-
Waters, B.1
|