-
1
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
A. Juels, R.N. Wright, S.D.C. di Vimercati, ACM
-
V. Goyal, O. Pandey, A. Sahai, and B. Waters Attribute-based encryption for fine-grained access control of encrypted data A. Juels, R.N. Wright, S.D.C. di Vimercati, ACM Conference on Computer and Communications Security 2006 ACM 89 98
-
(2006)
ACM Conference on Computer and Communications Security
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
2
-
-
24944554962
-
Fuzzy identity-based encryption
-
R. Cramer, LNCS Springer Berlin, Heidelberg
-
A. Sahai, and B. Waters Fuzzy identity-based encryption R. Cramer, Advances in Cryptology - EUROCRYPT 2005 LNCS vol. 3494 2005 Springer Berlin, Heidelberg 457 473 10.1007/11426639-27
-
(2005)
Advances in Cryptology - EUROCRYPT 2005
, vol.3494
, pp. 457-473
-
-
Sahai, A.1
Waters, B.2
-
3
-
-
0030687206
-
Proxy cryptosystems: delegation of the power to decrypt ciphertexts
-
M. Mambo, and E. Okamoto Proxy cryptosystems: delegation of the power to decrypt ciphertexts IEICE Trans. E80-A 1 1997 54 63
-
(1997)
IEICE Trans.
, vol.E80A
, Issue.1
, pp. 54-63
-
-
Mambo, M.1
Okamoto, E.2
-
4
-
-
84957718934
-
Divertible protocols and atomic proxy cryptography
-
K. Nyberg, LNCS Springer
-
M. Blaze, G. Bleumer, and M. Strauss Divertible protocols and atomic proxy cryptography K. Nyberg, EUROCRYPT LNCS vol. 1403 1998 Springer 127 144
-
(1998)
EUROCRYPT
, vol.1403
, pp. 127-144
-
-
Blaze, M.1
Bleumer, G.2
Strauss, M.3
-
5
-
-
33745218758
-
Improved proxy re-encryption schemes with applications to secure distributed storage
-
G. Ateniese, K. Fu, M. Green, and S. Hohenberger Improved proxy re-encryption schemes with applications to secure distributed storage ACM Trans. Inf. Syst. Secur. 9 1 2006 1 30
-
(2006)
ACM Trans. Inf. Syst. Secur.
, vol.9
, Issue.1
, pp. 1-30
-
-
Ateniese, G.1
Fu, K.2
Green, M.3
Hohenberger, S.4
-
6
-
-
77952362084
-
Attribute based proxy re-encryption with delegating capabilities
-
W. Li, W. Susilo, U.K. Tupakula, R. Safavi-Naini, V. Varadharajan, ACM
-
X. Liang, Z. Cao, H. Lin, and J. Shao Attribute based proxy re-encryption with delegating capabilities W. Li, W. Susilo, U.K. Tupakula, R. Safavi-Naini, V. Varadharajan, ASIACCS 2009 ACM 276 286
-
(2009)
ASIACCS
, pp. 276-286
-
-
Liang, X.1
Cao, Z.2
Lin, H.3
Shao, J.4
-
7
-
-
84890070570
-
A ciphertext-policy attribute-based proxy re-encryption with chosen-ciphertext security
-
K. Liang, L. Fang, W. Susilo, and D.S. Wong A ciphertext-policy attribute-based proxy re-encryption with chosen-ciphertext security INCoS 2013 IEEE 552 559
-
(2013)
INCoS, IEEE
, pp. 552-559
-
-
Liang, K.1
Fang, L.2
Susilo, W.3
Wong, D.S.4
-
9
-
-
45749116552
-
Provably secure ciphertext policy ABE
-
P. Ning, S.D.C. di Vimercati, P.F. Syverson, ACM
-
L. Cheung, and C.C. Newport Provably secure ciphertext policy ABE P. Ning, S.D.C. di Vimercati, P.F. Syverson, ACM Conference on Computer and Communications Security 2007 ACM 456 465
-
(2007)
ACM Conference on Computer and Communications Security
, pp. 456-465
-
-
Cheung, L.1
Newport, C.C.2
-
10
-
-
49049111604
-
Bounded ciphertext policy attribute based encryption
-
L. Aceto, I. Damgard, L.A. Goldberg, M.M. Halldórsson, A. Ingólfsdóttir, I. Walukiewicz, LNCS Springer
-
V. Goyal, A. Jain, O. Pandey, and A. Sahai Bounded ciphertext policy attribute based encryption L. Aceto, I. Damgrd, L.A. Goldberg, M.M. Halldórsson, A. Ingólfsdóttir, I. Walukiewicz, ICALP (2) LNCS vol. 5126 2008 Springer 579 591
-
(2008)
ICALP (2)
, vol.5126
, pp. 579-591
-
-
Goyal, V.1
Jain, A.2
Pandey, O.3
Sahai, A.4
-
11
-
-
79952521560
-
Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization
-
D. Catalano, N. Fazio, R. Gennaro, A. Nicolosi, LNCS Springer
-
B. Waters Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization D. Catalano, N. Fazio, R. Gennaro, A. Nicolosi, Public Key Cryptography LNCS vol. 6571 2011 Springer 53 70
-
(2011)
Public Key Cryptography
, vol.6571
, pp. 53-70
-
-
Waters, B.1
-
12
-
-
84856602103
-
Attribute-based encryption schemes with constant-size ciphertexts
-
N. Attrapadung, J. Herranz, F. Laguillaumie, B. Libert, E. de Panafieu, and C. Rafols Attribute-based encryption schemes with constant-size ciphertexts Theoret. Comput. Sci. 422 2012 15 38
-
(2012)
Theoret. Comput. Sci.
, vol.422
, pp. 15-38
-
-
Attrapadung, N.1
Herranz, J.2
Laguillaumie, F.3
Libert, B.4
De Panafieu, E.5
Rafols, C.6
-
13
-
-
84865452842
-
Functional encryption for regular languages
-
R. Safavi-Naini, R. Canetti, LNCS Springer
-
B. Waters Functional encryption for regular languages R. Safavi-Naini, R. Canetti, CRYPTO LNCS vol. 7417 2012 Springer 218 235
-
(2012)
CRYPTO
, vol.7417
, pp. 218-235
-
-
Waters, B.1
-
14
-
-
76549089793
-
Hidden attribute-based signatures without anonymity revocation
-
J. Li, and K. Kim Hidden attribute-based signatures without anonymity revocation Inform. Sci. 180 9 2010 1681 1689 10.1016/j.ins.2010.01.008
-
(2010)
Inform. Sci.
, vol.180
, Issue.9
, pp. 1681-1689
-
-
Li, J.1
Kim, K.2
-
15
-
-
80053563168
-
Enhancing attribute-based encryption with attribute hierarchy
-
J. Li, Q. Wang, C. Wang, and K. Ren Enhancing attribute-based encryption with attribute hierarchy MONET 16 5 2011 553 561 10.1007/s11036-010-0233-y
-
(2011)
MONET
, vol.16
, Issue.5
, pp. 553-561
-
-
Li, J.1
Wang, Q.2
Wang, C.3
Ren, K.4
-
16
-
-
84894634556
-
Securely outsourcing attribute-based encryption with checkability
-
J. Li, X. Huang, J. Li, X. Chen, and Y. Xiang Securely outsourcing attribute-based encryption with checkability IEEE Trans. Parallel Distrib. Syst. 25 8 2014 2201 2210 10.1109/TPDS.2013.271 URL: http://doi.ieeecomputersociety.org/10.1109/TPDS.2013.271
-
(2014)
IEEE Trans. Parallel Distrib. Syst.
, vol.25
, Issue.8
, pp. 2201-2210
-
-
Li, J.1
Huang, X.2
Li, J.3
Chen, X.4
Xiang, Y.5
-
17
-
-
77954635558
-
Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption
-
H. Gilbert, LNCS Springer
-
A.B. Lewko, T. Okamoto, A. Sahai, K. Takashima, and B. Waters Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption H. Gilbert, EUROCRYPT LNCS vol. 6110 2010 Springer 62 91
-
(2010)
EUROCRYPT
, vol.6110
, pp. 62-91
-
-
Lewko, A.B.1
Okamoto, T.2
Sahai, A.3
Takashima, K.4
Waters, B.5
-
18
-
-
84865479255
-
New proof methods for attribute-based encryption: achieving full security through selective techniques
-
R. Safavi-Naini, R. Canetti, LNCS Springer
-
A.B. Lewko, and B. Waters New proof methods for attribute-based encryption: achieving full security through selective techniques R. Safavi-Naini, R. Canetti, CRYPTO LNCS vol. 7417 2012 Springer 180 198
-
(2012)
CRYPTO
, vol.7417
, pp. 180-198
-
-
Lewko, A.B.1
Waters, B.2
-
19
-
-
77952361637
-
Chosen-ciphertext secure proxy re-encryption
-
P. Ning, S.D.C. di Vimercati, P.F. Syverson, ACM
-
R. Canetti, and S. Hohenberger Chosen-ciphertext secure proxy re-encryption P. Ning, S.D.C. di Vimercati, P.F. Syverson, ACM Conference on Computer and Communications Security 2007 ACM 185 194
-
(2007)
ACM Conference on Computer and Communications Security
, pp. 185-194
-
-
Canetti, R.1
Hohenberger, S.2
-
20
-
-
84874289731
-
Proxy re-encryption in a stronger security model extended from CT-RSA2012
-
LNCS Springer
-
T. Isshiki, M.H. Nguyen, and K. Tanaka Proxy re-encryption in a stronger security model extended from CT-RSA2012 CT-RSA 2012 LNCS vol. 7779 2013 Springer 277 292
-
(2013)
CT-RSA 2012
, vol.7779
, pp. 277-292
-
-
Isshiki, T.1
Nguyen, M.H.2
Tanaka, K.3
-
21
-
-
40249113119
-
Unidirectional chosen-ciphertext secure proxy re-encryption
-
R. Cramer, LNCS Springer
-
B. Libert, and D. Vergnaud Unidirectional chosen-ciphertext secure proxy re-encryption R. Cramer, Public Key Cryptography LNCS vol. 4939 2008 Springer 360 379
-
(2008)
Public Key Cryptography
, vol.4939
, pp. 360-379
-
-
Libert, B.1
Vergnaud, D.2
-
22
-
-
84863280137
-
Generic construction of chosen ciphertext secure proxy re-encryption
-
O. Dunkelman, LNCS Springer Berlin, Heidelberg
-
G. Hanaoka, Y. Kawai, N. Kunihiro, T. Matsuda, J. Weng, R. Zhang, and Y. Zhao Generic construction of chosen ciphertext secure proxy re-encryption O. Dunkelman, Topics in Cryptology - CT-RSA 2012 LNCS vol. 7178 2012 Springer Berlin, Heidelberg 349 364 10.1007/978-3-642-27954-6-22
-
(2012)
Topics in Cryptology - CT-RSA 2012
, vol.7178
, pp. 349-364
-
-
Hanaoka, G.1
Kawai, Y.2
Kunihiro, N.3
Matsuda, T.4
Weng, J.5
Zhang, R.6
Zhao, Y.7
-
23
-
-
77952322019
-
CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles
-
J. Weng, M. Chen, Y. Yang, R.H. Deng, K. Chen, and F. Bao CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles Sci. China Inf. Sci. 53 3 2010 593 606
-
(2010)
Sci. China Inf. Sci.
, vol.53
, Issue.3
, pp. 593-606
-
-
Weng, J.1
Chen, M.2
Yang, Y.3
Deng, R.H.4
Chen, K.5
Bao, F.6
-
24
-
-
84907463015
-
Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts
-
K. Liang, C. Chu, X. Tan, D.S. Wong, C. Tang, and J. Zhou Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts Theoret. Comput. Sci. 539 2014 87 105 10.1016/j.tcs.2014.04.027
-
(2014)
Theoret. Comput. Sci.
, vol.539
, pp. 87-105
-
-
Liang, K.1
Chu, C.2
Tan, X.3
Wong, D.S.4
Tang, C.5
Zhou, J.6
-
25
-
-
84906492583
-
An efficient cloud-based revocable identity-based proxy re-encryption scheme for public clouds data sharing
-
M. Kutylowski, J. Vaidya, Lecture Notes in Computer Science Springer
-
K. Liang, J.K. Liu, D.S. Wong, and W. Susilo An efficient cloud-based revocable identity-based proxy re-encryption scheme for public clouds data sharing M. Kutylowski, J. Vaidya, Computer Security - ESORICS 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I Lecture Notes in Computer Science vol. 8712 2014 Springer 257 272 10.1007/978-3-319-11203-9-15
-
(2014)
Computer Security - ESORICS 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I
, vol.8712
, pp. 257-272
-
-
Liang, K.1
Liu, J.K.2
Wong, D.S.3
Susilo, W.4
-
26
-
-
84875985547
-
A CCA-secure identity-based conditional proxy re-encryption without random oracles
-
T. Kwon, M.-K. Lee, D. Kwon, LNCS Springer
-
K. Liang, Z. Liu, X. Tan, D.S. Wong, and C. Tang A CCA-secure identity-based conditional proxy re-encryption without random oracles T. Kwon, M.-K. Lee, D. Kwon, ICISC LNCS vol. 7839 2012 Springer 231 246
-
(2012)
ICISC
, vol.7839
, pp. 231-246
-
-
Liang, K.1
Liu, Z.2
Tan, X.3
Wong, D.S.4
Tang, C.5
-
27
-
-
84883342901
-
A conditional proxy broadcast re-encryption scheme supporting timed-release
-
R.H. Deng, T. Feng, Lecture Notes in Computer Science Springer
-
K. Liang, Q. Huang, R. Schlegel, D.S. Wong, and C. Tang A conditional proxy broadcast re-encryption scheme supporting timed-release R.H. Deng, T. Feng, ISPEC Lecture Notes in Computer Science vol. 7863 2013 Springer 132 146
-
(2013)
ISPEC
, vol.7863
, pp. 132-146
-
-
Liang, K.1
Huang, Q.2
Schlegel, R.3
Wong, D.S.4
Tang, C.5
-
28
-
-
84910012203
-
Rcca-secure multi-use bidirectional proxy re-encryption with master secret security
-
S.S.M. Chow, J.K. Liu, L.C.K. Hui, S. Yiu, Lecture Notes in Computer Science Springer
-
R. Lu, X. Lin, J. Shao, and K. Liang Rcca-secure multi-use bidirectional proxy re-encryption with master secret security S.S.M. Chow, J.K. Liu, L.C.K. Hui, S. Yiu, Provable Security - 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings Lecture Notes in Computer Science vol. 8782 2014 Springer 194 205 10.1007/978-3-319-12475-9-14
-
(2014)
Provable Security - 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings
, vol.8782
, pp. 194-205
-
-
Lu, R.1
Lin, X.2
Shao, J.3
Liang, K.4
-
29
-
-
78650865160
-
Ciphertext policy attribute-based proxy re-encryption
-
M. Soriano, S. Qing, J. López, LNCS Springer
-
S. Luo, J. Hu, and Z. Chen Ciphertext policy attribute-based proxy re-encryption M. Soriano, S. Qing, J. López, ICICS LNCS vol. 6476 2010 Springer 401 415
-
(2010)
ICICS
, vol.6476
, pp. 401-415
-
-
Luo, S.1
Hu, J.2
Chen, Z.3
-
30
-
-
78650185456
-
Hybrid proxy re-encryption scheme for attribute-based encryption
-
F. Bao, M. Yung, D. Lin, J. Jing, LNCS Springer Berlin, Heidelberg
-
T. Mizuno, and H. Doi Hybrid proxy re-encryption scheme for attribute-based encryption F. Bao, M. Yung, D. Lin, J. Jing, Information Security and Cryptology LNCS vol. 6151 2011 Springer Berlin, Heidelberg 288 302 10.1007/978-3-642-16342-5-21
-
(2011)
Information Security and Cryptology
, vol.6151
, pp. 288-302
-
-
Mizuno, T.1
Doi, H.2
-
31
-
-
84858329462
-
Functional re-encryption and collusion-resistant obfuscation
-
R. Cramer, Lecture Notes in Computer Science Springer
-
N. Chandran, M. Chase, and V. Vaikuntanathan Functional re-encryption and collusion-resistant obfuscation R. Cramer, TCC Lecture Notes in Computer Science vol. 7194 2012 Springer 404 421
-
(2012)
TCC
, vol.7194
, pp. 404-421
-
-
Chandran, N.1
Chase, M.2
Vaikuntanathan, V.3
-
32
-
-
84901660031
-
An adaptively CCA-secure ciphertext-policy attribute-based proxy re-encryption for cloud data sharing
-
X. Huang, J. Zhou, Lecture Notes in Computer Science Springer
-
K. Liang, M.H. Au, W. Susilo, D.S. Wong, G. Yang, and Y. Yu An adaptively CCA-secure ciphertext-policy attribute-based proxy re-encryption for cloud data sharing X. Huang, J. Zhou, ISPEC Lecture Notes in Computer Science vol. 8434 2014 Springer 448 461
-
(2014)
ISPEC
, vol.8434
, pp. 448-461
-
-
Liang, K.1
Au, M.H.2
Susilo, W.3
Wong, D.S.4
Yang, G.5
Yu, Y.6
-
34
-
-
24144433396
-
Evaluating 2-DNF formulas on ciphertexts
-
J. Kilian, LNCS Springer
-
D. Boneh, E.-J. Goh, and K. Nissim Evaluating 2-DNF formulas on ciphertexts J. Kilian, TCC LNCS vol. 3378 2005 Springer 325 341
-
(2005)
TCC
, vol.3378
, pp. 325-341
-
-
Boneh, D.1
Goh, E.-J.2
Nissim, K.3
-
35
-
-
1842616017
-
Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack
-
R. Cramer, and V. Shoup Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack SIAM J. Comput. 33 1 2004 167 226
-
(2004)
SIAM J. Comput.
, vol.33
, Issue.1
, pp. 167-226
-
-
Cramer, R.1
Shoup, V.2
-
36
-
-
38049024484
-
Two-tier signatures, strongly unforgeable signatures, and Fiat-Shamir without random oracles
-
T. Okamoto, X. Wang, LNCS Springer
-
M. Bellare, and S. Shoup Two-tier signatures, strongly unforgeable signatures, and Fiat-Shamir without random oracles T. Okamoto, X. Wang, Public Key Cryptography LNCS vol. 4450 2007 Springer 201 216
-
(2007)
Public Key Cryptography
, vol.4450
, pp. 201-216
-
-
Bellare, M.1
Shoup, S.2
-
37
-
-
35048852705
-
Chosen-ciphertext security from identity-based encryption
-
C. Cachin, J. Camenisch, LNCS Springer
-
R. Canetti, S. Halevi, and J. Katz Chosen-ciphertext security from identity-based encryption C. Cachin, J. Camenisch, EUROCRYPT LNCS vol. 3027 2004 Springer 207 222
-
(2004)
EUROCRYPT
, vol.3027
, pp. 207-222
-
-
Canetti, R.1
Halevi, S.2
Katz, J.3
-
38
-
-
35248875326
-
Relaxing chosen-ciphertext security
-
D. Boneh, LNCS Springer
-
R. Canetti, H. Krawczyk, and J.B. Nielsen Relaxing chosen-ciphertext security D. Boneh, CRYPTO LNCS vol. 2729 2003 Springer 565 582
-
(2003)
CRYPTO
, vol.2729
, pp. 565-582
-
-
Canetti, R.1
Krawczyk, H.2
Nielsen, J.B.3
-
39
-
-
38149038713
-
Identity-based proxy re-encryption without random oracles
-
J.A. Garay, A.K. Lenstra, M. Mambo, R. Peralta, LNCS Springer
-
C.-K. Chu, and W.-G. Tzeng Identity-based proxy re-encryption without random oracles J.A. Garay, A.K. Lenstra, M. Mambo, R. Peralta, ISC LNCS vol. 4779 2007 Springer 189 202
-
(2007)
ISC
, vol.4779
, pp. 189-202
-
-
Chu, C.-K.1
Tzeng, W.-G.2
-
40
-
-
79961066267
-
A timed-release proxy re-encryption scheme
-
K. Emura, A. Miyaji, and K. Omote A timed-release proxy re-encryption scheme IEICE Trans. 94-A 8 2011 1682 1695
-
(2011)
IEICE Trans.
, vol.94A
, Issue.8
, pp. 1682-1695
-
-
Emura, K.1
Miyaji, A.2
Omote, K.3
|