-
1
-
-
33745218758
-
Improved proxy re-encryption schemes with applications to secure distributed storage
-
Feb.
-
G. Ateniese, K. Fu, M. Green, and S. Hohenberger, "Improved proxy re-encryption schemes with applications to secure distributed storage, " ACM Trans. Inf. Syst. Security, vol. 9, no. 1, pp. 1-30, Feb. 2006.
-
(2006)
ACM Trans. Inf. Syst. Security
, vol.9
, Issue.1
, pp. 1-30
-
-
Ateniese, G.1
Fu, K.2
Green, M.3
Hohenberger, S.4
-
2
-
-
84856602103
-
Attribute-based encryption schemes with constant-size ciphertexts
-
Mar.
-
N. Attrapadung, J. Herranz, F. Laguillaumie, B. Libert, E. de Panafieu, and C. Rafols, "Attribute-based encryption schemes with constant-size ciphertexts, " Theoretical Comput. Sci., vol. 422, pp. 15-38, Mar. 2012.
-
(2012)
Theoretical Comput. Sci.
, vol.422
, pp. 15-38
-
-
Attrapadung, N.1
Herranz, J.2
Laguillaumie, F.3
Libert, B.4
De Panafieu, E.5
Rafols, C.6
-
3
-
-
38049024484
-
Two-tier signatures, strongly unforgeable signatures, and Fiat-Shamir without random oracles
-
Berlin, Germany: Springer-Verlag
-
M. Bellare and S. Shoup, "Two-tier signatures, strongly unforgeable signatures, and Fiat-Shamir without random oracles, " in Public Key Cryptography (Lecture Notes in Computer Science), vol. 4450. Berlin, Germany: Springer-Verlag, 2007, pp. 201-216.
-
(2007)
Public Key Cryptography (Lecture Notes in Computer Science)
, vol.4450
, pp. 201-216
-
-
Bellare, M.1
Shoup, S.2
-
4
-
-
34548731375
-
Ciphertext-policy attribute-based encryption
-
J. Bethencourt, A. Sahai, and B. Waters, "Ciphertext-policy attribute-based encryption, " in Proc. IEEE Symp. Security Privacy, May 2007, pp. 321-334.
-
(2007)
Proc. IEEE Symp. Security Privacy, May
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
5
-
-
84957718934
-
Divertible protocols and atomic proxy cryptography
-
Berlin, Germany: Springer-Verlag
-
M. Blaze, G. Bleumer, and M. Strauss, "Divertible protocols and atomic proxy cryptography, " in Advances in Cryptology. Berlin, Germany: Springer-Verlag, 1998, pp. 127-144.
-
(1998)
Advances in Cryptology
, pp. 127-144
-
-
Blaze, M.1
Bleumer, G.2
Strauss, M.3
-
6
-
-
24144433396
-
Evaluating 2-DNF formulas on ciphertexts
-
Berlin, Germany: Springer-Verlag
-
D. Boneh, E.-J. Goh, and K. Nissim, "Evaluating 2-DNF formulas on ciphertexts, " in Theory of Cryptography (Lecture Notes in Computer Science), vol. 3378. Berlin, Germany: Springer-Verlag, 2005, pp. 325-341.
-
(2005)
Theory of Cryptography (Lecture Notes in Computer Science)
, vol.3378
, pp. 325-341
-
-
Boneh, D.1
Goh, E.-J.2
Nissim, K.3
-
7
-
-
77952361637
-
Chosen-ciphertext secure proxy re-encryption
-
R. Canetti and S. Hohenberger, "Chosen-ciphertext secure proxy re-encryption, " in Proc. 14th ACM CCS, 2007, pp. 185-194.
-
(2007)
Proc. 14th ACM CCS
, pp. 185-194
-
-
Canetti, R.1
Hohenberger, S.2
-
8
-
-
45749116552
-
Provably secure ciphertext policy ABE
-
L. Cheung and C. Newport, "Provably secure ciphertext policy ABE, " in Proc. 14th ACM CCS, 2007, pp. 456-465.
-
(2007)
Proc. 14th ACM CCS
, pp. 456-465
-
-
Cheung, L.1
Newport, C.2
-
9
-
-
1842616017
-
Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack
-
Jan.
-
R. Cramer and V. Shoup, "Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack, " SIAM J. Comput., vol. 33, no. 1, pp. 167-226, Jan. 2004.
-
(2004)
SIAM J. Comput.
, vol.33
, Issue.1
, pp. 167-226
-
-
Cramer, R.1
Shoup, V.2
-
10
-
-
49049111604
-
Bounded ciphertext policy attribute based encryption
-
Jul.
-
V. Goyal, A. Jain, O. Pandey, and A. Sahai, "Bounded ciphertext policy attribute based encryption, " in Proc. 35th Int. Colloq. ICALP, Jul. 2008, pp. 579-591.
-
(2008)
Proc. 35th Int. Colloq. ICALP
, pp. 579-591
-
-
Goyal, V.1
Jain, A.2
Pandey, O.3
Sahai, A.4
-
11
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
V. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attribute-based encryption for fine-grained access control of encrypted data, " in Proc. 13th ACM CCS, 2006, pp. 89-98.
-
(2006)
Proc. 13th ACM CCS
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
12
-
-
38049061546
-
Identity-based proxy re-encryption
-
Jun.
-
M. Green and G. Ateniese, "Identity-based proxy re-encryption, " in Proc. 5th Int. Conf. ACNS, vol. 4512. Jun. 2007, pp. 288-306.
-
(2007)
Proc. 5th Int. Conf. ACNS
, vol.4512
, pp. 288-306
-
-
Green, M.1
Ateniese, G.2
-
13
-
-
84863280137
-
Generic construction of chosen ciphertext secure proxy re-encryption
-
Berlin, Germany: Springer-Verlag
-
G. Hanaoka et al., "Generic construction of chosen ciphertext secure proxy re-encryption, " in Topics in Cryptology (Lecture Notes in Computer Science), vol. 7178. Berlin, Germany: Springer-Verlag, 2012, pp. 349-364.
-
(2012)
Topics in Cryptology (Lecture Notes in Computer Science)
, vol.7178
, pp. 349-364
-
-
Hanaoka, G.1
-
14
-
-
84874289731
-
Proxy re-encryption in a stronger security model extended from CT-RSA2012
-
Berlin, Germany: Springer-Verlag
-
T. Isshiki, M. H. Nguyen, and K. Tanaka, "Proxy re-encryption in a stronger security model extended from CT-RSA2012, " in Topics in Cryptology (Lecture Notes in Computer Science), vol. 7779. Berlin, Germany: Springer-Verlag, pp. 277-292.
-
Topics in Cryptology (Lecture Notes in Computer Science)
, vol.7779
, pp. 277-292
-
-
Isshiki, T.1
Nguyen, M.H.2
Tanaka, K.3
-
15
-
-
57949106557
-
Proxy cryptography revisited
-
Feb.
-
A. A. Ivan and Y. Dodis, "Proxy cryptography revisited, " in Proc. NDSS, Feb. 2003.
-
(2003)
Proc. NDSS
-
-
Ivan, A.A.1
Dodis, Y.2
-
16
-
-
77954635558
-
Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption
-
Berlin, Germany: Springer-Verlag
-
A. Lewko, T. Okamoto, A. Sahai, K. Takashima, and B. Waters, "Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption, " in Advances in Cryptology (Lecture Notes in Computer Science), vol. 6110. Berlin, Germany: Springer-Verlag, 2010, pp. 62-91.
-
(2010)
Advances in Cryptology (Lecture Notes in Computer Science)
, vol.6110
, pp. 62-91
-
-
Lewko, A.1
Okamoto, T.2
Sahai, A.3
Takashima, K.4
Waters, B.5
-
17
-
-
84865479255
-
New proof methods for attribute-based encryption: Achieving full security through selective techniques
-
Berlin, Germany: Springer-Verlag
-
A. Lewko and B. Waters, "New proof methods for attribute-based encryption: Achieving full security through selective techniques, " in Advances in Cryptology (Lecture Notes in Computer Science), vol. 7417. Berlin, Germany: Springer-Verlag, 2012, pp. 180-198.
-
(2012)
Advances in Cryptology (Lecture Notes in Computer Science)
, vol.7417
, pp. 180-198
-
-
Lewko, A.1
Waters, B.2
-
18
-
-
84901660031
-
An adaptively CCA-secure ciphertext-policy attribute-based proxy re-encryption for cloud data sharing
-
May
-
K. Liang, M. H. Au, W. Susilo, D. S. Wong, G. Yang, and Y. Yu, "An adaptively CCA-secure ciphertext-policy attribute-based proxy re-encryption for cloud data sharing, " in Proc. 10th Int. Conf. ISPEC, vol. 8434. May 2014, pp. 448-461.
-
(2014)
Proc. 10th Int. Conf. ISPEC
, vol.8434
, pp. 448-461
-
-
Liang, K.1
Au, M.H.2
Susilo, W.3
Wong, D.S.4
Yang, G.5
Yu, Y.6
-
19
-
-
84907463015
-
Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts
-
Jun.
-
K. Liang, C.-K. Chu, X. Tan, D. S. Wong, C. Tang, and J. Zhou, "Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts, " Theoretical Comput. Sci., vol. 539, pp. 87-105, Jun. 2014.
-
(2014)
Theoretical Comput. Sci.
, vol.539
, pp. 87-105
-
-
Liang, K.1
Chu, C.-K.2
Tan, X.3
Wong, D.S.4
Tang, C.5
Zhou, J.6
-
20
-
-
84890070570
-
A ciphertext-policy attribute-based proxy re-encryption with chosen-ciphertext security
-
Sep.
-
K. Liang, L. Fang, W. Susilo, and D. S. Wong, "A ciphertext-policy attribute-based proxy re-encryption with chosen-ciphertext security, " in Proc. 5th Int. Conf. INCoS, Sep. 2013, pp. 552-559.
-
(2013)
Proc. 5th Int. Conf. INCoS
, pp. 552-559
-
-
Liang, K.1
Fang, L.2
Susilo, W.3
Wong, D.S.4
-
21
-
-
84883342901
-
A conditional proxy broadcast re-encryption scheme supporting timed-release
-
R. H. Deng and T. Feng, Eds. Berlin, Germany: Springer-Verlag
-
K. Liang, Q. Huang, R. Schlegel, D. S. Wong, and C. Tang, "A conditional proxy broadcast re-encryption scheme supporting timed-release, " in Information Security Practice and Experience (Lecture Notes in Computer Science), vol. 7863, R. H. Deng and T. Feng, Eds. Berlin, Germany: Springer-Verlag, 2013, pp. 132-146.
-
(2013)
Information Security Practice and Experience (Lecture Notes in Computer Science)
, vol.7863
, pp. 132-146
-
-
Liang, K.1
Huang, Q.2
Schlegel, R.3
Wong, D.S.4
Tang, C.5
-
22
-
-
84875985547
-
A CCA-secure identity-based conditional proxy re-encryption without random oracles
-
Berlin, Germany: Springer-Verlag
-
K. Liang, Z. Liu, X. Tan, D. S. Wong, and C. Tang, "A CCA-secure identity-based conditional proxy re-encryption without random oracles, " in Information Security Practice and Experience (Lecture Notes in Computer Science), vol. 7839. Berlin, Germany: Springer-Verlag, 2013, pp. 231-246.
-
(2013)
Information Security Practice and Experience (Lecture Notes in Computer Science)
, vol.7839
, pp. 231-246
-
-
Liang, K.1
Liu, Z.2
Tan, X.3
Wong, D.S.4
Tang, C.5
-
23
-
-
77952362084
-
Attribute based proxy re-encryption with delegating capabilities
-
X. Liang, Z. Cao, H. Lin, and J. Shao, "Attribute based proxy re-encryption with delegating capabilities, " in Proc. 4th Int. Symp. ASIACCS, 2009, pp. 276-286.
-
(2009)
Proc. 4th Int. Symp. ASIACCS
, pp. 276-286
-
-
Liang, X.1
Cao, Z.2
Lin, H.3
Shao, J.4
-
24
-
-
52149099038
-
Tracing Malicious proxies in proxy re-encryption
-
Berlin, Germany: Springer-Verlag
-
B. Libert and D. Vergnaud, "Tracing Malicious proxies in proxy re-encryption, " in Pairing-Based Cryptography (Lecture Notes in Computer Science), vol. 5209. Berlin, Germany: Springer-Verlag, 2008, pp. 332-353.
-
(2008)
Pairing-Based Cryptography (Lecture Notes in Computer Science)
, vol.5209
, pp. 332-353
-
-
Libert, B.1
Vergnaud, D.2
-
25
-
-
40249113119
-
Unidirectional chosen-ciphertext secure proxy re-encryption
-
Berlin, Germany: Springer-Verlag
-
B. Libert and D. Vergnaud, "Unidirectional chosen-ciphertext secure proxy re-encryption, " in Public Key Cryptography (Lecture Notes in Computer Science), vol. 4939. Berlin, Germany: Springer-Verlag, 2008, pp. 360-379.
-
(2008)
Public Key Cryptography (Lecture Notes in Computer Science)
, vol.4939
, pp. 360-379
-
-
Libert, B.1
Vergnaud, D.2
-
26
-
-
78650865160
-
Ciphertext policy attribute-based proxy re-encryption
-
M. Soriano, S. Qing, and J. López, Eds. Berlin, Germany: Springer-Verlag
-
S. Luo, J. Hu, and Z. Chen, "Ciphertext policy attribute-based proxy re-encryption, " in Information and Communications Security (Lecture Notes in Computer Science), vol. 6476, M. Soriano, S. Qing, and J. López, Eds. Berlin, Germany: Springer-Verlag, 2010, pp. 401-415.
-
(2010)
Information and Communications Security (Lecture Notes in Computer Science)
, vol.6476
, pp. 401-415
-
-
Luo, S.1
Hu, J.2
Chen, Z.3
-
27
-
-
0030687206
-
Proxy cryptosystems: Delegation of the power to decrypt ciphertexts
-
M. Mambo and E. Okamoto, "Proxy cryptosystems: Delegation of the power to decrypt ciphertexts, " IEICE Trans. Fund. Electron., Commun. Comput. Sci., vol. E80-A, no. 1, pp. 54-63, 1997.
-
(1997)
IEICE Trans. Fund. Electron., Commun. Comput. Sci., Vol. E80-A
, Issue.1
, pp. 54-63
-
-
Mambo, M.1
Okamoto, E.2
-
28
-
-
78650185456
-
Hybrid proxy re-encryption scheme for attribute-based encryption
-
Berlin, Germany: Springer-Verlag
-
T. Mizuno and H. Doi, "Hybrid proxy re-encryption scheme for attribute-based encryption, " in Information Security and Cryptology (Lecture Notes in Computer Science), vol. 6151. Berlin, Germany: Springer-Verlag, 2011, pp. 288-302.
-
(2011)
Information Security and Cryptology (Lecture Notes in Computer Science)
, vol.6151
, pp. 288-302
-
-
Mizuno, T.1
Doi, H.2
-
29
-
-
74049120601
-
Attribute-based encryption with non-monotonic access structures
-
R. Ostrovsky, A. Sahai, and B. Waters, "Attribute-based encryption with non-monotonic access structures, " in Proc. 14th ACM CCS, 2007, pp. 195-203.
-
(2007)
Proc. 14th ACM CCS
, pp. 195-203
-
-
Ostrovsky, R.1
Sahai, A.2
Waters, B.3
-
30
-
-
24944554962
-
Fuzzy identity-based encryption
-
Berlin, Germany: Springer-Verlag
-
A. Sahai and B. Waters, "Fuzzy identity-based encryption, " in Advances in Cryptology (Lecture Notes in Computer Science), vol. 3494. Berlin, Germany: Springer-Verlag, 2005, pp. 457-473.
-
(2005)
Advances in Cryptology (Lecture Notes in Computer Science)
, vol.3494
, pp. 457-473
-
-
Sahai, A.1
Waters, B.2
-
31
-
-
79952521560
-
Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization
-
Berlin, Germany: Springer-Verlag
-
B. Waters, "Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization, " in Public Key Cryptography (Lecture Notes in Computer Science), vol. 6571. Berlin, Germany: Springer-Verlag, 2011, pp. 53-70.
-
(2011)
Public Key Cryptography (Lecture Notes in Computer Science)
, vol.6571
, pp. 53-70
-
-
Waters, B.1
-
32
-
-
84865452842
-
Functional encryption for regular languages
-
Berlin, Germany: Springer-Verlag
-
B. Waters, "Functional encryption for regular languages, " in Advances in Cryptology (Lecture Notes in Computer Science), vol. 7417. Berlin, Germany: Springer-Verlag, 2012, pp. 218-235.
-
(2012)
Advances in Cryptology (Lecture Notes in Computer Science)
, vol.7417
, pp. 218-235
-
-
Waters, B.1
-
33
-
-
77952320634
-
Conditional proxy re-encryption secure against chosen-ciphertext attack
-
J. Weng, R. H. Deng, X. Ding, C.-K. Chu, and J. Lai, "Conditional proxy re-encryption secure against chosen-ciphertext attack, " in Proc. 4th Int. Symp. ASIACCS, 2009, pp. 322-332.
-
(2009)
Proc. 4th Int. Symp. ASIACCS
, pp. 322-332
-
-
Weng, J.1
Deng, R.H.2
Ding, X.3
Chu, C.-K.4
Lai, J.5
-
34
-
-
79952493650
-
Generic constructions for chosen-ciphertext secure attribute based encryption
-
Berlin, Germany: Springer-Verlag
-
S. Yamada, N. Attrapadung, G. Hanaoka, and N. Kunihiro, "Generic constructions for chosen-ciphertext secure attribute based encryption, " in Public Key Cryptography (Lecture Notes in Computer Science), vol. 6571. Berlin, Germany: Springer-Verlag, 2011, pp. 71-89.
-
(2011)
Public Key Cryptography (Lecture Notes in Computer Science)
, vol.6571
, pp. 71-89
-
-
Yamada, S.1
Attrapadung, N.2
Hanaoka, G.3
Kunihiro, N.4
|