-
1
-
-
84874324906
-
Identity-based encryption from the weil pairing
-
In: Kilian, J. (ed.) Springer, Heidelberg
-
Boneh, D., Franklin,M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213-229. Springer, Heidelberg (2001)
-
(2001)
CRYPTO 2001. LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
2
-
-
69949166012
-
Identity-based encryption with efficient revocation
-
In: Ning, P., Syverson, P.F., Jha, S. (eds.). ACM
-
Boldyreva, A., Goyal, V., Kumar, V.: Identity-based encryption with efficient revocation. In: Ning, P., Syverson, P.F., Jha, S. (eds.) ACM Conference on Computer and Communications Security, pp. 417-426. ACM (2008)
-
(2008)
ACM Conference on Computer and Communications Security
, pp. 417-426
-
-
Boldyreva, A.1
Goyal, V.2
Kumar, V.3
-
3
-
-
84865465739
-
Dynamic credentials and ciphertext delegation for attribute-based encryption
-
In: Safavi-Naini, R., Canetti, R. (eds.) Springer, Heidelberg
-
Sahai, A., Seyalioglu, H., Waters, B.: Dynamic credentials and ciphertext delegation for attribute-based encryption. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol. 7417, pp. 199-217. Springer, Heidelberg (2012)
-
(2012)
CRYPTO 2012. LNCS
, vol.7417
, pp. 199-217
-
-
Sahai, A.1
Seyalioglu, H.2
Waters, B.3
-
4
-
-
38049061546
-
Identity-based proxy re-encryption
-
In: Katz, J., Yung, M. (eds.) Springer, Heidelberg
-
Green, M., Ateniese, G.: Identity-based proxy re-encryption. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 288-306. Springer, Heidelberg (2007)
-
(2007)
ACNS 2007. LNCS
, vol.4521
, pp. 288-306
-
-
Green, M.1
Ateniese, G.2
-
5
-
-
24944554962
-
Fuzzy identity-based encryption
-
In: Cramer, R. (ed.) Springer, Heidelberg
-
Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457-473. Springer, Heidelberg (2005)
-
(2005)
Eurocrypt 2005. LNCS
, vol.3494
, pp. 457-473
-
-
Sahai, A.1
Waters, B.2
-
6
-
-
67650112905
-
Adaptive-id secure revocable identity-based encryption
-
In: Fischlin, M. (ed.) Springer, Heidelberg
-
Libert, B., Vergnaud, D.: Adaptive-id secure revocable identity-based encryption. In: Fischlin, M. (ed.) CT-RSA 2009. LNCS, vol. 5473, pp. 1-15. Springer, Heidelberg (2009)
-
(2009)
CT-RSA 2009. LNCS
, vol.5473
, pp. 1-15
-
-
Libert, B.1
Vergnaud, D.2
-
7
-
-
24944566040
-
Efficient identity-based encryption without random oracles
-
In: Cramer, R. (ed.) Springer, Heidelberg
-
Waters, B.: Efficient identity-based encryption without random oracles. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 114-127. Springer, Heidelberg (2005)
-
(2005)
Eurocrypt 2005. LNCS
, vol.3494
, pp. 114-127
-
-
Waters, B.1
-
8
-
-
33746062799
-
Practical identity-based encryption without random oracles
-
In: Vaudenay, S. (ed.) Springer, Heidelberg
-
Gentry, C.: Practical identity-based encryption without random oracles. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 445-464. Springer, Heidelberg (2006)
-
(2006)
Eurocrypt 2006. LNCS
, vol.4004
, pp. 445-464
-
-
Gentry, C.1
-
9
-
-
84873951160
-
Revocable identity-based encryption revisited: Security model and construction
-
In: Kurosawa, K., Hanaoka, G. (eds.) Springer, Heidelberg
-
Seo, J.H., Emura, K.: Revocable identity-based encryption revisited: Security model and construction. In: Kurosawa, K., Hanaoka, G. (eds.) PKC 2013. LNCS, vol. 7778, pp. 216-234. Springer, Heidelberg (2013)
-
(2013)
PKC 2013. LNCS
, vol.7778
, pp. 216-234
-
-
Seo, J.H.1
Emura, K.2
-
10
-
-
35048840186
-
Identity-based threshold decryption
-
In: Bao, F., Deng, R., Zhou, J. (eds.) Springer, Heidelberg
-
Baek, J., Zheng, Y.: Identity-based threshold decryption. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol. 2947, pp. 262-276. Springer, Heidelberg (2004)
-
(2004)
PKC 2004. LNCS
, vol.2947
, pp. 262-276
-
-
Baek, J.1
Zheng, Y.2
-
11
-
-
35248845998
-
Simple identity-based cryptography with mediated rsa
-
In: Joye, M. (ed.) Springer, Heidelberg
-
Ding, X., Tsudik, G.: Simple identity-based cryptography with mediated rsa. In: Joye, M. (ed.) CT-RSA 2003. LNCS, vol. 2612, pp. 193-210. Springer, Heidelberg (2003)
-
(2003)
CT-RSA 2003. LNCS
, vol.2612
, pp. 193-210
-
-
Ding, X.1
Tsudik, G.2
-
12
-
-
1142293103
-
Efficient revocation and threshold pairing based cryptosystems
-
In: Borowsky, E., Rajsbaum, S. (eds.). ACM
-
Libert, B., Quisquater, J.J.: Efficient revocation and threshold pairing based cryptosystems. In: Borowsky, E., Rajsbaum, S. (eds.) PODC, pp. 163-171. ACM (2003)
-
(2003)
PODC
, pp. 163-171
-
-
Libert, B.1
Quisquater, J.J.2
-
13
-
-
72449201970
-
Attribute-based encryption supporting direct/indirect revocation modes
-
In: Parker, M.G. (ed.) Springer, Heidelberg
-
Attrapadung, N., Imai, H.: Attribute-based encryption supporting direct/indirect revocation modes. In: Parker, M.G. (ed.) Cryptography and Coding 2009. LNCS, vol. 5921, pp. 278-300. Springer, Heidelberg (2009)
-
(2009)
Cryptography and Coding 2009. LNCS
, vol.5921
, pp. 278-300
-
-
Attrapadung, N.1
Imai, H.2
-
14
-
-
69949143544
-
Conjunctive broadcast and attribute-based encryption
-
In: Shacham, H., Waters, B. (eds.) Springer, Heidelberg
-
Attrapadung, N., Imai, H.: Conjunctive broadcast and attribute-based encryption. In: Shacham, H., Waters, B. (eds.) Pairing 2009. LNCS, vol. 5671, pp. 248-265. Springer, Heidelberg (2009)
-
(2009)
Pairing 2009. LNCS
, vol.5671
, pp. 248-265
-
-
Attrapadung, N.1
Imai, H.2
-
15
-
-
84864808088
-
Fully private revocable predicate encryption
-
In: Susilo, W., Mu, Y., Seberry, J. (eds.) Springer, Heidelberg
-
Nieto, J.M.G., Manulis, M., Sun, D.: Fully private revocable predicate encryption. In: Susilo, W., Mu, Y., Seberry, J. (eds.) ACISP 2012. LNCS, vol. 7372, pp. 350-363. Springer, Heidelberg (2012)
-
(2012)
ACISP 2012. LNCS
, vol.7372
, pp. 350-363
-
-
Nieto, J.M.G.1
Manulis, M.2
Sun, D.3
-
16
-
-
0030687206
-
Proxy cryptosystems: Delegation of the power to decrypt ciphertexts
-
Mambo, M., Okamoto, E.: Proxy cryptosystems: Delegation of the power to decrypt ciphertexts. IEICE Transactions E80-A(1), 54-63 (1997)
-
(1997)
IEICE Transactions
, vol.E80-A
, Issue.1
, pp. 54-63
-
-
Mambo, M.1
Okamoto, E.2
-
17
-
-
84957718934
-
Divertible protocols and atomic proxy cryptography
-
In: Nyberg, K. (ed.) Springer, Heidelberg
-
Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127-144. Springer, Heidelberg (1998)
-
(1998)
Eurocrypt 1998. LNCS
, vol.1403
, pp. 127-144
-
-
Blaze, M.1
Bleumer, G.2
Strauss, M.3
-
18
-
-
33745218758
-
Improved proxy re-encryption schemes with applications to secure distributed storage
-
Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 9(1), 1-30 (2006)
-
(2006)
ACM Trans. Inf. Syst. Secur.
, vol.9
, Issue.1
, pp. 1-30
-
-
Ateniese, G.1
Fu, K.2
Green, M.3
Hohenberger, S.4
-
19
-
-
77952361637
-
Chosen-ciphertext secure proxy re-encryption
-
In: Ning, P., di Vimercati, S.D.C., Syverson, P.F. (eds.). ACM
-
Canetti, R., Hohenberger, S.: Chosen-ciphertext secure proxy re-encryption. In: Ning, P., di Vimercati, S.D.C., Syverson, P.F. (eds.) ACM Conference on Computer and Communications Security, pp. 185-194. ACM (2007)
-
(2007)
ACM Conference on Computer and Communications Security
, pp. 185-194
-
-
Canetti, R.1
Hohenberger, S.2
-
20
-
-
84874289731
-
Proxy re-encryption in a stronger security model extended from ct-rsa2012
-
In: Dawson, E. (ed.) Springer, Heidelberg
-
Isshiki, T., Nguyen, M.H., Tanaka, K.: Proxy re-encryption in a stronger security model extended from ct-rsa2012. In: Dawson, E. (ed.) CT-RSA 2013. LNCS, vol. 7779, pp. 277-292. Springer, Heidelberg (2013)
-
(2013)
CT-RSA 2013. LNCS
, vol.7779
, pp. 277-292
-
-
Isshiki, T.1
Nguyen, M.H.2
Tanaka, K.3
-
21
-
-
40249113119
-
Unidirectional chosen-ciphertext secure proxy reencryption
-
In: Cramer, R. (ed.) Springer, Heidelberg
-
Libert, B., Vergnaud, D.: Unidirectional chosen-ciphertext secure proxy reencryption. In: Cramer, R. (ed.) PKC 2008. LNCS, vol. 4939, pp. 360-379. Springer, Heidelberg (2008)
-
(2008)
PKC 2008. LNCS
, vol.4939
, pp. 360-379
-
-
Libert, B.1
Vergnaud, D.2
-
22
-
-
84863280137
-
Generic construction of chosen ciphertext secure proxy re-encryption
-
In: Dunkelman, O. (ed.) Springer, Heidelberg
-
Hanaoka, G., Kawai, Y., Kunihiro, N., Matsuda, T., Weng, J., Zhang, R., Zhao, Y.: Generic construction of chosen ciphertext secure proxy re-encryption. In: Dunkelman, O. (ed.) CT-RSA 2012. LNCS, vol. 7178, pp. 349-364. Springer, Heidelberg (2012)
-
(2012)
CT-RSA 2012. LNCS
, vol.7178
, pp. 349-364
-
-
Hanaoka, G.1
Kawai, Y.2
Kunihiro, N.3
Matsuda, T.4
Weng, J.5
Zhang, R.6
Zhao, Y.7
-
23
-
-
67650109748
-
Inter-domain identity-based proxy reencryption
-
In: Yung, M., Liu, P., Lin, D. (eds.) Springer, Heidelberg
-
Tang, Q., Hartel, P.H., Jonker, W.: Inter-domain identity-based proxy reencryption. In: Yung, M., Liu, P., Lin, D. (eds.) Inscrypt 2008. LNCS, vol. 5487, pp. 332-347. Springer, Heidelberg (2009)
-
(2009)
Inscrypt 2008. LNCS
, vol.5487
, pp. 332-347
-
-
Tang, Q.1
Hartel, P.H.2
Jonker, W.3
-
24
-
-
38149038713
-
Identity-based proxy re-encryption without random oracles
-
In: Garay, J.A., Lenstra, A.K., Mambo, M., Peralta, R. (eds.) Springer, Heidelberg
-
Chu, C.-K., Tzeng, W.-G.: Identity-based proxy re-encryption without random oracles. In: Garay, J.A., Lenstra, A.K., Mambo, M., Peralta, R. (eds.) ISC 2007. LNCS, vol. 4779, pp. 189-202. Springer, Heidelberg (2007)
-
(2007)
ISC 2007. LNCS
, vol.4779
, pp. 189-202
-
-
Chu, C.-K.1
Tzeng, W.-G.2
-
25
-
-
35248875326
-
Relaxing chosen-ciphertext security
-
In: Boneh, D. (ed.) Springer, Heidelberg
-
Canetti, R., Krawczyk, H., Nielsen, J.B.: Relaxing chosen-ciphertext security. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 565-582. Springer, Heidelberg (2003)
-
(2003)
CRYPTO 2003. LNCS
, vol.2729
, pp. 565-582
-
-
Canetti, R.1
Krawczyk, H.2
Nielsen, J.B.3
-
26
-
-
50049099260
-
Proxy re-encryption systems for identity-based encryption
-
In: Takagi, T., Okamoto, T., Okamoto, E., Okamoto, T. (eds.) Springer, Heidelberg
-
Matsuo, T.: Proxy re-encryption systems for identity-based encryption. In: Takagi, T., Okamoto, T., Okamoto, E., Okamoto, T. (eds.) Pairing 2007. LNCS, vol. 4575, pp. 247-267. Springer, Heidelberg (2007)
-
(2007)
Pairing 2007. LNCS
, vol.4575
, pp. 247-267
-
-
Matsuo, T.1
-
27
-
-
84855307392
-
Identity-based proxy cryptosystems with revocability and hierarchical confidentialities
-
Wang, L.,Wang, L., Mambo, M., Okamoto, E.: Identity-based proxy cryptosystems with revocability and hierarchical confidentialities. IEICE Transactions 95-A(1), 70-88 (2012)
-
(2012)
IEICE Transactions
, vol.95 A
, Issue.1
, pp. 70-88
-
-
Wang, L.1
Wang, L.2
Mambo, M.3
Okamoto, E.4
-
28
-
-
78650288030
-
New identity-based proxy reencryption schemes to prevent collusion attacks
-
In: Joye, M., Miyaji, A., Otsuka, A. (eds.) Springer, Heidelberg
-
Wang, L., Wang, L., Mambo, M., Okamoto, E.: New identity-based proxy reencryption schemes to prevent collusion attacks. In: Joye, M., Miyaji, A., Otsuka, A. (eds.) Pairing 2010. LNCS, vol. 6487, pp. 327-346. Springer, Heidelberg (2010)
-
(2010)
Pairing 2010. LNCS
, vol.6487
, pp. 327-346
-
-
Wang, L.1
Wang, L.2
Mambo, M.3
Okamoto, E.4
-
29
-
-
78650937188
-
Secure and efficient IBE-PKE proxy re-encryption
-
Mizuno, T., Doi, H.: Secure and efficient IBE-PKE proxy re-encryption. IEICE Transactions E94-A(1), 36-44 (2011)
-
(2011)
IEICE Transactions
, vol.E94-A
, Issue.1
, pp. 36-44
-
-
Mizuno, T.1
Doi, H.2
-
30
-
-
84864644840
-
Fully secure unidirectional identity-based proxy reencryption
-
In: Kim, H. (ed.) Springer, Heidelberg
-
Luo, S., Shen, Q., Chen, Z.: Fully secure unidirectional identity-based proxy reencryption. In: Kim, H. (ed.) ICISC 2011. LNCS, vol. 7259, pp. 109-126. Springer, Heidelberg (2012)
-
(2012)
ICISC 2011. LNCS
, vol.7259
, pp. 109-126
-
-
Luo, S.1
Shen, Q.2
Chen, Z.3
-
31
-
-
84861582429
-
Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption
-
Shao, J., Cao, Z.: Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption. Information Sciences 206, 83-95 (2012)
-
(2012)
Information Sciences
, vol.206
, pp. 83-95
-
-
Shao, J.1
Cao, Z.2
-
32
-
-
84875985547
-
A CCA-secure identity-based conditional proxy re-encryption without random oracles
-
In: Kwon, T., Lee, M.-K., Kwon, D. (eds.) Springer, Heidelberg
-
Liang, K., Liu, Z., Tan, X., Wong, D.S., Tang, C.: A CCA-secure identity-based conditional proxy re-encryption without random oracles. In: Kwon, T., Lee, M.-K., Kwon, D. (eds.) ICISC 2012. LNCS, vol. 7839, pp. 231-246. Springer, Heidelberg (2013)
-
(2013)
ICISC 2012. LNCS
, vol.7839
, pp. 231-246
-
-
Liang, K.1
Liu, Z.2
Tan, X.3
Wong, D.S.4
Tang, C.5
-
33
-
-
84906492583
-
-
Cryptology ePrint Archive, Report 2014/473
-
Liang, K., Liu, J.K., Wong, D.S., Susilo, W.: An efficient cloud-based revocable identity-based proxy re-encryption scheme for public clouds data sharing. Cryptology ePrint Archive, Report 2014/473 (2014), http://eprint.iacr. org/
-
(2014)
An Efficient Cloud-based Revocable Identity-based Proxy Re-encryption Scheme for Public Clouds Data Sharing
-
-
Liang, K.1
Liu, J.K.2
Wong, D.S.3
Susilo, W.4
-
34
-
-
84880174080
-
Adaptive CCA broadcast encryption with constant-size secret keys and ciphertexts
-
Phan, D.H., Pointcheval, D., Shahandashti, S.F., Strefler, M.: Adaptive CCA broadcast encryption with constant-size secret keys and ciphertexts. Int. J. Inf. Sec. 12(4), 251-265 (2013)
-
(2013)
Int. J. Inf. Sec.
, vol.12
, Issue.4
, pp. 251-265
-
-
Phan, D.H.1
Pointcheval, D.2
Shahandashti, S.F.3
Strefler, M.4
-
35
-
-
79952521560
-
Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization
-
In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) Springer, Heidelberg
-
Waters, B.: Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 53-70. Springer, Heidelberg (2011)
-
(2011)
PKC 2011. LNCS
, vol.6571
, pp. 53-70
-
-
Waters, B.1
|