-
1
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Berlin, Germany: Springer-Verlag
-
A. Shamir, "Identity-based cryptosystems and signature schemes," in Advances in Cryptology. Berlin, Germany: Springer-Verlag, 1985, pp. 47-53.
-
(1985)
Advances in Cryptology
, pp. 47-53
-
-
Shamir, A.1
-
2
-
-
24944554962
-
Fuzzy identity-based encryption
-
Berlin, Germany: Springer-Verlag
-
A. Sahai and B. Waters, "Fuzzy identity-based encryption," in Advances in Cryptology. Berlin, Germany: Springer-Verlag, 2005, pp. 457-473.
-
(2005)
Advances in Cryptology.
, pp. 457-473
-
-
Sahai, A.1
Waters, B.2
-
3
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
V. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attribute-based encryption for fine-grained access control of encrypted data," in Proc. 13th CCS, 2006, pp. 89-98.
-
(2006)
Proc. 13th CCS
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
4
-
-
34548731375
-
Ciphertext-policy attributebased encryption
-
May
-
J. Bethencourt, A. Sahai, and B. Waters, "Ciphertext-policy attributebased encryption," in Proc. IEEE SP, May 2007, pp. 321-334.
-
(2007)
Proc. IEEE SP
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
5
-
-
38049078557
-
Multi-authority attribute based encryption
-
Berlin, Germany: Springer-Verlag
-
M. Chase, "Multi-authority attribute based encryption," in Theory of Cryptography. Berlin, Germany: Springer-Verlag, 2007, pp. 515-534.
-
(2007)
Theory of Cryptography.
, pp. 515-534
-
-
Chase, M.1
-
6
-
-
74049163235
-
Improving privacy and security in multi-authority attribute-based encryption
-
M. Chase and S. S. M. Chow, "Improving privacy and security in multi-authority attribute-based encryption," in Proc. 16th CCS, 2009, pp. 121-130.
-
(2009)
Proc. 16th CCS
, pp. 121-130
-
-
Chase, M.1
Chow, S.S.M.2
-
7
-
-
77950867637
-
Secure threshold multi authority attribute based encryption without a central authority
-
H. Lin, Z. Cao, X. Liang, and J. Shao, "Secure threshold multi authority attribute based encryption without a central authority," Inf. Sci., vol. 180, no. 13, pp. 2618-2632, 2010.
-
(2010)
Inf. Sci.
, vol.180
, Issue.13
, pp. 2618-2632
-
-
Lin, H.1
Cao, Z.2
Liang, X.3
Shao, J.4
-
8
-
-
84856905411
-
Multi-authority attribute-based encryption with honest-but-curious central authority
-
V. Božović, D. Socek, R. Steinwandt, and V. I. Villányi, "Multi-authority attribute-based encryption with honest-but-curious central authority," Int. J. Comput. Math., vol. 89, no. 3, pp. 268-283, 2012.
-
(2012)
Int. J. Comput. Math.
, vol.89
, Issue.3
, pp. 268-283
-
-
Božović, V.1
Socek, D.2
Steinwandt, R.3
Villányi, V.I.4
-
9
-
-
84880914747
-
Low complexity multi-authority attribute based encryption scheme for mobile cloud computing
-
Mar.
-
F. Li, Y. Rahulamathavan, M. Rajarajan, and R. C.-W. Phan, "Low complexity multi-authority attribute based encryption scheme for mobile cloud computing," in Proc. IEEE 7th SOSE, Mar. 2013, pp. 573-577.
-
(2013)
Proc. IEEE 7th SOSE
, pp. 573-577
-
-
Li, F.1
Rahulamathavan, Y.2
Rajarajan, M.3
Phan, R.C.-W.4
-
10
-
-
84883076035
-
DAC-MACS: Effective data access control for multi-authority cloud storage systems
-
Apr.
-
K. Yang, X. Jia, K. Ren, and B. Zhang, "DAC-MACS: Effective data access control for multi-authority cloud storage systems," in Proc. IEEE INFOCOM, Apr. 2013, pp. 2895-2903.
-
(2013)
Proc. IEEE INFOCOM
, pp. 2895-2903
-
-
Yang, K.1
Jia, X.2
Ren, K.3
Zhang, B.4
-
11
-
-
79957993008
-
Decentralizing attribute-based encryption
-
Berlin, Germany: Springer-Verlag
-
A. Lewko and B. Waters, "Decentralizing attribute-based encryption," in Advances in Cryptology. Berlin, Germany: Springer-Verlag, 2011, pp. 568-588.
-
(2011)
Advances in Cryptology.
, pp. 568-588
-
-
Lewko, A.1
Waters, B.2
-
12
-
-
69649105305
-
On multi-authority ciphertext-policy attribute-based encryption
-
S. Müller, S. Katzenbeisser, and C. Eckert, "On multi-authority ciphertext-policy attribute-based encryption," Bull. Korean Math. Soc., vol. 46, no. 4, pp. 803-819, 2009.
-
(2009)
Bull. Korean Math. Soc.
, vol.46
, Issue.4
, pp. 803-819
-
-
Müller, S.1
Katzenbeisser, S.2
Eckert, C.3
-
13
-
-
84988273293
-
Multiauthority ciphertext-policy attribute-based encryption with accountability
-
J. Li, Q. Huang, X. Chen, S. S. Chow, D. S. Wong, and D. Xie, "Multiauthority ciphertext-policy attribute-based encryption with accountability," in Proc. 6th ASIACCS, 2011, pp. 386-390.
-
(2011)
Proc. 6th ASIACCS
, pp. 386-390
-
-
Li, J.1
Huang, Q.2
Chen, X.3
Chow, S.S.4
Wong, D.S.5
Xie, D.6
-
14
-
-
84877041512
-
Fully secure multi-authority attribute-based traitor tracing
-
H. Ma, G. Zeng, Z. Wang, and J. Xu, "Fully secure multi-authority attribute-based traitor tracing," J. Comput. Inf. Syst., vol. 9, no. 7, pp. 2793-2800, 2013.
-
(2013)
J. Comput. Inf. Syst.
, vol.9
, Issue.7
, pp. 2793-2800
-
-
Ma, H.1
Zeng, G.2
Wang, Z.3
Xu, J.4
-
15
-
-
84873974141
-
Attribute-based encryption with fast decryption
-
Berlin, Germany: Springer-Verlag
-
S. Hohenberger and B. Waters, "Attribute-based encryption with fast decryption," in Public-Key Cryptography. Berlin, Germany: Springer-Verlag, 2013, pp. 162-179.
-
(2013)
Public-Key Cryptography
, pp. 162-179
-
-
Hohenberger, S.1
Waters, B.2
-
16
-
-
84885145341
-
Attribute-based secure data sharing with hidden policies in smart grid
-
Nov.
-
J. Hur, "Attribute-based secure data sharing with hidden policies in smart grid," IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 11, pp. 2171-2180, Nov. 2013.
-
(2013)
IEEE Trans. Parallel Distrib. Syst.
, vol.24
, Issue.11
, pp. 2171-2180
-
-
Hur, J.1
-
17
-
-
84878002758
-
Anonymous attributebased encryption supporting efficient decryption test
-
Y. Zhang, X. Chen, J. Li, D. S. Wong, and H. Li, "Anonymous attributebased encryption supporting efficient decryption test," in Proc. 8th ASIACCS, 2013, pp. 511-516.
-
(2013)
Proc. 8th ASIACCS
, pp. 511-516
-
-
Zhang, Y.1
Chen, X.2
Li, J.3
Wong, D.S.4
Li, H.5
-
18
-
-
84874324906
-
Identity-based encryption from the weil pairing
-
Berlin, Germany: Springer-Verlag
-
D. Boneh and M. Franklin, "Identity-based encryption from the weil pairing," in Advances in Cryptology. Berlin, Germany: Springer-Verlag, 2001, pp. 213-229.
-
(2001)
Advances in Cryptology
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
19
-
-
33645998872
-
Fuzzy identity-based encryption
-
Berlin, Germany: Springer-Verlag
-
A. Sahai and B. Waters, "Fuzzy identity-based encryption," Advances in Cryptology. Berlin, Germany: Springer-Verlag, 2005.
-
(2005)
Advances in Cryptology
-
-
Sahai, A.1
Waters, B.2
-
20
-
-
79956315357
-
Hierarchical attribute-set based encryption for scalable, flexible and fine-grained access control in cloud computing
-
Berlin, Germany: Springer-Verlag
-
J. Liu, Z. Wan, and M. Gu, "Hierarchical attribute-set based encryption for scalable, flexible and fine-grained access control in cloud computing," in Information Security Practice and Experience. Berlin, Germany: Springer-Verlag, 2011, pp. 98-107.
-
(2011)
Information Security Practice and Experience
, pp. 98-107
-
-
Liu, J.1
Wan, Z.2
Gu, M.3
-
21
-
-
34548769073
-
Attribute-based publishing with hidden credentials and hidden policies
-
A. Kapadia, P. P. Tsang, and S. W. Smith, "Attribute-based publishing with hidden credentials and hidden policies," in Proc. NDSS, 2007, pp. 179-192.
-
(2007)
Proc. NDSS
, pp. 179-192
-
-
Kapadia, A.1
Tsang, P.P.2
Smith, S.W.3
-
22
-
-
58049192731
-
Attribute-based content distribution with hidden policy
-
Oct.
-
S. Yu, K. Ren, and W. Lou, "Attribute-based content distribution with hidden policy," in Proc. 4th Workshop Secure Netw. Protocols, Oct. 2008, pp. 39-44.
-
(2008)
Proc. 4th Workshop Secure Netw. Protocols
, pp. 39-44
-
-
Yu, S.1
Ren, K.2
Lou, W.3
-
23
-
-
84863392301
-
HASBE: A hierarchical attributebased solution for flexible and scalable access control in cloud computing
-
Apr.
-
Z. Wan, J. Liu, and R. H. Deng, "HASBE: A hierarchical attributebased solution for flexible and scalable access control in cloud computing," IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 743-754, Apr. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.2
, pp. 743-754
-
-
Wan, Z.1
Liu, J.2
Deng, R.H.3
-
24
-
-
84883089676
-
Privacypreserving data aggregation without secure channel: Multivariate polynomial evaluation
-
Apr.
-
T. Jung, X. Mao, X.-Y. Li, S.-J. Tang, W. Gong, and L. Zhang, "Privacypreserving data aggregation without secure channel: Multivariate polynomial evaluation," in Proc. IEEE INFOCOM, Apr. 2013, pp. 2634-2642.
-
(2013)
Proc. IEEE INFOCOM
, pp. 2634-2642
-
-
Jung, T.1
Mao, X.2
Li, X.-Y.3
Tang, S.-J.4
Gong, W.5
Zhang, L.6
-
25
-
-
84927654398
-
Collusion-tolerable privacy-preserving sum and product calculation without secure channel
-
to be published
-
T. Jung and X.-Y. Li, "Collusion-tolerable privacy-preserving sum and product calculation without secure channel," IEEE Trans. Dependable Secure Comput., to be published.
-
IEEE Trans. Dependable Secure Comput.
-
-
Jung, T.1
Li, X.-Y.2
-
26
-
-
84883115549
-
Search me if you can: Privacy-preserving location query service
-
Apr.
-
X.-Y. Li and T. Jung, "Search me if you can: Privacy-preserving location query service," in Proc. IEEE INFOCOM, Apr. 2013, pp. 2760-2768.
-
(2013)
Proc. IEEE INFOCOM
, pp. 2760-2768
-
-
Li, X.-Y.1
Jung, T.2
-
27
-
-
84883129081
-
Verifiable private multiparty computation: Ranging and ranking
-
Apr.
-
L. Zhang, X.-Y. Li, Y. Liu, and T. Jung, "Verifiable private multiparty computation: Ranging and ranking," in Proc. IEEE INFOCOM, Apr. 2013, pp. 605-609.
-
(2013)
Proc. IEEE INFOCOM
, pp. 605-609
-
-
Zhang, L.1
Li, X.-Y.2
Liu, Y.3
Jung, T.4
-
28
-
-
84893264480
-
Message in a sealed bottle: Privacy preserving friending in social networks
-
Jul.
-
L. Zhang, X.-Y. Li, and Y. Liu, "Message in a sealed bottle: Privacy preserving friending in social networks," in Proc. IEEE 33rd ICDCS, Jul. 2013, pp. 327-336.
-
(2013)
Proc. IEEE 33rd ICDCS
, pp. 327-336
-
-
Zhang, L.1
Li, X.-Y.2
Liu, Y.3
-
29
-
-
77953295132
-
Privacy-preserving public auditing for data storage security in cloud computing
-
Mar.
-
C. Wang, Q. Wang, K. Ren, and W. Lou, "Privacy-preserving public auditing for data storage security in cloud computing," in Proc. IEEE INFOCOM, Mar. 2010, pp. 1-9.
-
(2010)
Proc. IEEE INFOCOM
, pp. 1-9
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Lou, W.4
-
30
-
-
79960862322
-
Secure and practical outsourcing of linear programming in cloud computing
-
Apr.
-
C. Wang, K. Ren, and J. Wang, "Secure and practical outsourcing of linear programming in cloud computing," in Proc. IEEE INFOCOM, Apr. 2011, pp. 820-828.
-
(2011)
Proc. IEEE INFOCOM
, pp. 820-828
-
-
Wang, C.1
Ren, K.2
Wang, J.3
-
31
-
-
77955905009
-
Secure ranked keyword search over encrypted cloud data
-
Jun.
-
C. Wang, N. Cao, J. Li, K. Ren, and W. Lou, "Secure ranked keyword search over encrypted cloud data," in Proc. IEEE 30th ICDCS, Jun. 2010, pp. 253-262.
-
(2010)
Proc. IEEE 30th ICDCS
, pp. 253-262
-
-
Wang, C.1
Cao, N.2
Li, J.3
Ren, K.4
Lou, W.5
-
32
-
-
79551533095
-
Rumor riding: Anonymizing unstructured peer-to-peer systems
-
Mar.
-
Y. Liu, J. Han, and J. Wang, "Rumor riding: Anonymizing unstructured peer-to-peer systems," IEEE Trans. Parallel Distrib. Syst., vol. 22, no. 3, pp. 464-475, Mar. 2011.
-
(2011)
IEEE Trans. Parallel Distrib. Syst.
, vol.22
, Issue.3
, pp. 464-475
-
-
Liu, Y.1
Han, J.2
Wang, J.3
-
33
-
-
84919828919
-
-
[Online]. Available accessed 2014
-
Tor: Anonymized Network. [Online]. Available: https://www.torproject.org/, accessed 2014.
-
Tor: Anonymized Network.
-
-
-
34
-
-
0018545449
-
How to share a secret
-
A. Shamir, "How to share a secret," Commun. ACM, vol. 22, no. 11, pp. 612-613, 1979.
-
(1979)
Commun. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
35
-
-
0032669864
-
Oblivious transfer and polynomial evaluation
-
M. Naor and B. Pinkas, "Oblivious transfer and polynomial evaluation," in Proc. 31st STOC, 1999, pp. 245-254.
-
(1999)
Proc. 31st STOC
, pp. 245-254
-
-
Naor, M.1
Pinkas, B.2
-
36
-
-
0022080529
-
A randomized protocol for signing contracts
-
S. Even, O. Goldreich, and A. Lempel, "A randomized protocol for signing contracts," Commun. ACM, vol. 28, no. 6, pp. 637-647, 1985.
-
(1985)
Commun. ACM
, vol.28
, Issue.6
, pp. 637-647
-
-
Even, S.1
Goldreich, O.2
Lempel, A.3
-
37
-
-
1342345050
-
Efficient 1-out-of-n oblivious transfer schemes with universally usable parameters
-
Feb.
-
W.-G. Tzeng, "Efficient 1-out-of-n oblivious transfer schemes with universally usable parameters," IEEE Trans. Comput., vol. 53, no. 2, pp. 232-240, Feb. 2004.
-
(2004)
IEEE Trans. Comput.
, vol.53
, Issue.2
, pp. 232-240
-
-
Tzeng, W.-G.1
-
39
-
-
84911191578
-
Efficient user revocation for privacy-aware PKI
-
W. Ren, K. Ren, W. Lou, and Y. Zhang, "Efficient user revocation for privacy-aware PKI," in Proc. ICST, 2008, Art. ID 11.
-
(2008)
Proc. ICST
-
-
Ren, W.1
Ren, K.2
Lou, W.3
Zhang, Y.4
-
40
-
-
84870885441
-
Scalable and secure sharing of personal health records in cloud computing using attributebased encryption
-
Jan.
-
M. Li, S. Yu, Y. Zheng, K. Ren, and W. Lou, "Scalable and secure sharing of personal health records in cloud computing using attributebased encryption," IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 1, pp. 131-143, Jan. 2013.
-
(2013)
IEEE Trans. Parallel Distrib. Syst.
, vol.24
, Issue.1
, pp. 131-143
-
-
Li, M.1
Yu, S.2
Zheng, Y.3
Ren, K.4
Lou, W.5
-
41
-
-
77954471010
-
Attribute based data sharing with attribute revocation
-
S. Yu, C. Wang, K. Ren, and W. Lou, "Attribute based data sharing with attribute revocation," in Proc. 5th ASIACCS, 2010, pp. 261-270.
-
(2010)
Proc. 5th ASIACCS
, pp. 261-270
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
|