-
1
-
-
0003745894
-
-
Ph.D. thesis, Israel Institute of Technology, Technion, Haifa, Israel
-
Beimel, A.: Secure schemes for secret sharing and key distribution. Ph.D. thesis, Israel Institute of Technology, Technion, Haifa, Israel (1996)
-
(1996)
Secure schemes for secret sharing and key distribution
-
-
Beimel, A.1
-
2
-
-
34548731375
-
Ciphertext-policy attribute-based encryption
-
Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, pp. 321-334 (2007)
-
(2007)
IEEE Symposium on Security and Privacy
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
3
-
-
38049078557
-
Multi-authority Attribute Based Encryption
-
In: Vadhan, S.P. (ed.), Springer, Heidelberg
-
Chase, M.: Multi-authority Attribute Based Encryption. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 515-534. Springer, Heidelberg (2007)
-
(2007)
TCC 2007. LNCS
, vol.4392
, pp. 515-534
-
-
Chase, M.1
-
5
-
-
77955211933
-
Revocation systems with very small private keys
-
Lewko, A., Sahai, A., Waters, B.: Revocation systems with very small private keys. In: IEEE Symposium on Security and Privacy, pp. 273-285 (2010)
-
(2010)
IEEE Symposium on Security and Privacy
, pp. 273-285
-
-
Lewko, A.1
Sahai, A.2
Waters, B.3
-
6
-
-
79957993008
-
Decentralizing attribute-based encryption
-
In: Paterson, K.G. (ed.), Springer, Heidelberg
-
Lewko, A., Waters, B.: Decentralizing attribute-based encryption. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 568-588. Springer, Heidelberg (2011)
-
(2011)
EUROCRYPT 2011. LNCS
, vol.6632
, pp. 568-588
-
-
Lewko, A.1
Waters, B.2
-
7
-
-
84922017540
-
Broadcast revocation scheme in composite-order bilinear group and its application to attribute-based encryption
-
Li, Q., Xiong, H., Zhang, F.: Broadcast revocation scheme in composite-order bilinear group and its application to attribute-based encryption. International Journal of Security and Networks 8(1), 1-12 (2013)
-
(2013)
International Journal of Security and Networks
, vol.8
, Issue.1
, pp. 1-12
-
-
Li, Q.1
Xiong, H.2
Zhang, F.3
-
8
-
-
84891814259
-
Optimized Ciphertext-Policy Attribute-Based Encryption with Efficient Revocation
-
Li, Y., Zhu, J., Wang, X., Chai, Y., Shao, S.: Optimized Ciphertext-Policy Attribute-Based Encryption with Efficient Revocation. International Journal of Security & Its Applications 7(6) (2013)
-
(2013)
International Journal of Security & Its Applications
, vol.7
, Issue.6
-
-
Li, Y.1
Zhu, J.2
Wang, X.3
Chai, Y.4
Shao, S.5
-
9
-
-
79957599737
-
-
TechnicalReport, University of Waterloo
-
Liang, X., Lu, R., Lin, X., Shen, X.S.: Ciphertext policy attribute based encryption with efficient revocation. TechnicalReport, University of Waterloo (2010)
-
(2010)
Ciphertext policy attribute based encryption with efficient revocation
-
-
Liang, X.1
Lu, R.2
Lin, X.3
Shen, X.S.4
-
10
-
-
84856190480
-
Dacc: Distributed access control in clouds
-
Ruj, S., Nayak, A., Stojmenovic, I.: Dacc: Distributed access control in clouds. In: IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 91-98 (2011)
-
(2011)
IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications
, pp. 91-98
-
-
Ruj, S.1
Nayak, A.2
Stojmenovic, I.3
-
11
-
-
84865465739
-
Dynamic credentials and ciphertext delegation for attribute-based encryption
-
In: Safavi-Naini, R., Canetti, R. (eds.), Springer, Heidelberg
-
Sahai, A., Seyalioglu, H., Waters, B.: Dynamic credentials and ciphertext delegation for attribute-based encryption. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol. 7417, pp. 199-217. Springer, Heidelberg (2012)
-
(2012)
CRYPTO 2012. LNCS
, vol.7417
, pp. 199-217
-
-
Sahai, A.1
Seyalioglu, H.2
Waters, B.3
-
12
-
-
24944554962
-
Fuzzy identity-based encryption
-
In: Cramer, R. (ed.), Springer, Heidelberg
-
Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457-473. Springer, Heidelberg (2005)
-
(2005)
EUROCRYPT 2005. LNCS
, vol.3494
, pp. 457-473
-
-
Sahai, A.1
Waters, B.2
-
13
-
-
79960839401
-
Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers
-
Wang, G., Liu, Q., Wu, J., Guo, M.: Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers. Computers & Security 30(5), 320-331 (2011)
-
(2011)
Computers & Security
, vol.30
, Issue.5
, pp. 320-331
-
-
Wang, G.1
Liu, Q.2
Wu, J.3
Guo, M.4
-
14
-
-
79952521560
-
Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization
-
In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.), Springer, Heidelberg
-
Waters, B.: Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 53-70. Springer, Heidelberg (2011)
-
(2011)
PKC 2011. LNCS
, vol.6571
, pp. 53-70
-
-
Waters, B.1
-
15
-
-
84883076035
-
DAC-MACS: Effective data access control for multi-authority cloud storage systems
-
Yang, K., Jia, X., Ren, K., Zhang, B.: DAC-MACS: Effective data access control for multi-authority cloud storage systems. In: INFOCOM, 2013 Proceedings IEEE, pp. 2895-2903 (2013)
-
(2013)
INFOCOM, 2013 Proceedings IEEE
, pp. . 2895-. 2903
-
-
Yang, K.1
Jia, X.2
Ren, K.3
Zhang, B.4
|