-
1
-
-
79952510987
-
Expressive key-policy attribute-based encryption with constant-size ciphertexts
-
In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.), Springer, Heidelberg
-
Attrapadung, N., Libert, B., de Panafieu, E.: Expressive key-policy attribute-based encryption with constant-size ciphertexts. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 90–108. Springer, Heidelberg (2011)
-
(2011)
PKC 2011. LNCS
, vol.6571
, pp. 90-108
-
-
Attrapadung, N.1
Libert, B.2
De Panafieu, E.3
-
2
-
-
34548731375
-
Ciphertext-policy attribute-based encryption
-
SP 2007, IEEE
-
Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, SP 2007, pp. 321–334. IEEE (2007)
-
(2007)
IEEE Symposium on Security and Privacy
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
3
-
-
84874324906
-
Identity-based encryption from the weil pairing
-
In: Kilian, J. (ed.), Springer, Heidelberg
-
Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)
-
(2001)
CRYPTO 2001. LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
4
-
-
84946840347
-
Short signatures from the weil pairing
-
In: Boyd, C. (ed.), Springer, Heidelberg
-
Boneh, D., Lynn, B., Shacham, H.: Short signatures from the weil pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 514–532. Springer, Heidelberg (2001)
-
(2001)
ASIACRYPT 2001. LNCS
, vol.2248
, pp. 514-532
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
5
-
-
35248897599
-
A forward-secure public-key encryption scheme
-
In: Biham, E. (ed.), Springer, Heidelberg
-
Canetti, R., Halevi, S., Katz, J.: A forward-secure public-key encryption scheme. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 255–271. Springer, Heidelberg (2003)
-
(2003)
EUROCRYPT 2003. LNCS
, vol.2656
, pp. 255-271
-
-
Canetti, R.1
Halevi, S.2
Katz, J.3
-
6
-
-
77950151506
-
An identity based encryption scheme based on quadratic residues
-
In: Honary, B. (ed.), Springer, Heidelberg
-
Cocks, C.: An identity based encryption scheme based on quadratic residues. In: Honary, B. (ed.) Cryptography and Coding 2001. LNCS, vol. 2260, pp. 360–363. Springer, Heidelberg (2001)
-
(2001)
Cryptography and Coding 2001. LNCS
, vol.2260
, pp. 360-363
-
-
Cocks, C.1
-
7
-
-
70350635850
-
A ciphertext-policy attribute-based encryption scheme with constant ciphertext length
-
In: Bao, F., Li, H., Wang, G. (eds.), Springer, Heidelberg
-
Emura, K., Miyaji, A., Nomura, A., Omote, K., Soshi, M.: A ciphertext-policy attribute-based encryption scheme with constant ciphertext length. In: Bao, F., Li, H., Wang, G. (eds.) ISPEC 2009. LNCS, vol. 5451, pp. 13–23. Springer, Heidelberg (2009)
-
(2009)
ISPEC 2009. LNCS
, vol.5451
, pp. 13-23
-
-
Emura, K.1
Miyaji, A.2
Nomura, A.3
Omote, K.4
Soshi, M.5
-
8
-
-
84864803494
-
Threshold ciphertext policy attribute-based encryption with constant size ciphertexts
-
In: Susilo, W., Mu, Y., Seberry, J. (eds.), Springer, Heidelberg
-
Ge, A., Zhang, R., Chen, C., Ma, C., Zhang, Z.: Threshold ciphertext policy attribute-based encryption with constant size ciphertexts. In: Susilo, W., Mu, Y., Seberry, J. (eds.) ACISP 2012. LNCS, vol. 7372, pp. 336–349. Springer, Heidelberg (2012)
-
(2012)
ACISP 2012. LNCS
, vol.7372
, pp. 336-349
-
-
Ge, A.1
Zhang, R.2
Chen, C.3
Ma, C.4
Zhang, Z.5
-
9
-
-
34547273527
-
Attribute-based encryption for finegrained access control of encrypted data
-
ACM
-
Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for finegrained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 89–98. ACM (2006)
-
(2006)
Proceedings of the 13th ACM Conference on Computer and Communications Security
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
10
-
-
79952523217
-
Constant size ciphertexts in threshold attribute-based encryption
-
In: Nguyen, P.Q., Pointcheval, D. (eds.), Springer, Heidelberg
-
Herranz, J., Laguillaumie, F., Ràfols, C.: Constant size ciphertexts in threshold attribute-based encryption. In: Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. LNCS, vol. 6056, pp. 19–34. Springer, Heidelberg (2010)
-
(2010)
PKC 2010. LNCS
, vol.6056
, pp. 19-34
-
-
Herranz, J.1
Laguillaumie, F.2
Ràfols, C.3
-
11
-
-
79951972056
-
-
Univeristy of Twente, Tech. Rep
-
Ibraimi, L., Petkovic, M., Nikova, S., Hartel, P., Jonker, W.: Ciphertext-policy attribute-based threshold decryption with flexible delegation and revocation of user attributes. Univeristy of Twente, Tech. Rep. (2009)
-
(2009)
Ciphertext-policy attribute-based threshold decryption with flexible delegation and revocation of user attributes
-
-
Ibraimi, L.1
Petkovic, M.2
Nikova, S.3
Hartel, P.4
Jonker, W.5
-
12
-
-
77954635558
-
Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption
-
In: Gilbert, H. (ed.), Springer, Heidelberg
-
Lewko, A., Okamoto, T., Sahai, A., Takashima, K., Waters, B.: Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 62–91. Springer, Heidelberg (2010)
-
(2010)
EUROCRYPT 2010. LNCS
, vol.6110
, pp. 62-91
-
-
Lewko, A.1
Okamoto, T.2
Sahai, A.3
Takashima, K.4
Waters, B.5
-
13
-
-
79957993008
-
Decentralizing attribute-based encryption
-
In: Paterson, K.G. (ed.), Springer, Heidelberg
-
Lewko, A., Waters, B.: Decentralizing attribute-based encryption. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 568–588. Springer, Heidelberg (2011)
-
(2011)
EUROCRYPT 2011. LNCS
, vol.6632
, pp. 568-588
-
-
Lewko, A.1
Waters, B.2
-
14
-
-
84870885441
-
Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption
-
Li, M., Yu, S., Zheng, Y., Ren, K., Lou, W.: Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Transactions on Parallel and Distributed Systems 24(1), 131–143 (2013)
-
(2013)
IEEE Transactions on Parallel and Distributed Systems
, vol.24
, Issue.1
, pp. 131-143
-
-
Li, M.1
Yu, S.2
Zheng, Y.3
Ren, K.4
Lou, W.5
-
15
-
-
77950867637
-
Secure threshold multi authority attribute based encryption without a central authority
-
Lin, H., Cao, Z., Liang, X., Shao, J.: Secure threshold multi authority attribute based encryption without a central authority. Information Sciences 180(13), 2618–2632 (2010)
-
(2010)
Information Sciences
, vol.180
, Issue.13
, pp. 2618-2632
-
-
Lin, H.1
Cao, Z.2
Liang, X.3
Shao, J.4
-
16
-
-
84855342560
-
On efficiently transferring the linear secret-sharing scheme matrix in ciphertext-policy attribute-based encryption
-
2010
-
Liu, Z., Cao, Z.: On efficiently transferring the linear secret-sharing scheme matrix in ciphertext-policy attribute-based encryption. IACR Cryptology ePrint Archive 2010, 374 (2010)
-
(2010)
IACR Cryptology ePrint Archive
, pp. 374
-
-
Liu, Z.1
Cao, Z.2
-
17
-
-
34547269639
-
Using threshold attribute-based encryption for practical biometric-based access control
-
Nali, D., Adams, C.M., Miri, A.: Using threshold attribute-based encryption for practical biometric-based access control. IJ Network Security 1(3), 173–182 (2005)
-
(2005)
IJ Network Security
, vol.1
, Issue.3
, pp. 173-182
-
-
Nali, D.1
Adams, C.M.2
Miri, A.3
-
18
-
-
24944554962
-
Fuzzy identity-based encryption
-
In: Cramer, R. (ed.), Springer, Heidelberg
-
Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457–473. Springer, Heidelberg (2005)
-
(2005)
EUROCRYPT 2005. LNCS
, vol.3494
, pp. 457-473
-
-
Sahai, A.1
Waters, B.2
-
19
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
In: Blakely, G.R., Chaum, D. (eds.), Springer, Heidelberg
-
Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)
-
(1985)
CRYPTO 1984. LNCS
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
20
-
-
79952521560
-
Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization
-
In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.), Springer, Heidelberg
-
Waters, B.: Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 53–70. Springer, Heidelberg (2011)
-
(2011)
PKC 2011. LNCS
, vol.6571
, pp. 53-70
-
-
Waters, B.1
-
21
-
-
77953310709
-
Achieving secure, scalable, and fine-grained data access control in cloud computing
-
IEEE
-
Yu, S., Wang, C., Ren, K., Lou, W.: Achieving secure, scalable, and fine-grained data access control in cloud computing. In: 2010 Proceedings of the IEEE INFOCOM, pp. 1–9. IEEE (2010)
-
(2010)
2010 Proceedings of the IEEE INFOCOM
, pp. 1-9
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
-
22
-
-
77954471010
-
Attribute based data sharing with attribute revocation
-
ACM
-
Yu, S., Wang, C., Ren, K., Lou, W.: Attribute based data sharing with attribute revocation. In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, pp. 261–270. ACM (2010)
-
(2010)
Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
, pp. 261-270
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
|