-
3
-
-
33745166648
-
Collusion resistant broadcast encryption with short ciphertexts and private keys
-
D. Boneh, C. Gentry, and B. Waters, "Collusion resistant broadcast encryption with short ciphertexts and private keys," in Proc. CRYPTO, 2005, pp. 258-275.
-
Proc. CRYPTO, 2005
, pp. 258-275
-
-
Boneh, D.1
Gentry, C.2
Waters, B.3
-
4
-
-
57949110628
-
Identity-based broadcast encryption with constant size ciphertexts and private keys
-
C. Delerablée, "Identity-based broadcast encryption with constant size ciphertexts and private keys," in Proc. ASIACRYPT, 2007, pp. 200-215.
-
Proc. ASIACRYPT, 2007
, pp. 200-215
-
-
Delerablée, C.1
-
6
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
A. Shamir, "Identity-based cryptosystems and signature schemes," in Proc. CRYPTO, 1984, pp. 47-53.
-
Proc. CRYPTO, 1984
, pp. 47-53
-
-
Shamir, A.1
-
8
-
-
33646823652
-
Efficient identity-based key encapsulation to multiple parties
-
M. Barbosa and P. Farshim, "Efficient identity-based key encapsulation to multiple parties," in Proc. IMA Int. Conf., 2005, pp. 428-441.
-
Proc. IMA Int. Conf., 2005
, pp. 428-441
-
-
Barbosa, M.1
Farshim, P.2
-
12
-
-
84880852861
-
Revocation and tracing schemes for stateless receivers
-
D. Naor, M. Naor, and J. B. Lotspiech, "Revocation and tracing schemes for stateless receivers," in Proc. 21st Annu. Int. CRYPTO, 2001, pp. 41-62.
-
Proc. 21st Annu. Int. CRYPTO, 2001
, pp. 41-62
-
-
Naor, D.1
Naor, M.2
Lotspiech, J.B.3
-
13
-
-
70350345210
-
Dual system encryption: Realizing fully secure IBE and HIBE under simple assumptions
-
S. Halevi, Ed. Berlin, Germany: Springer-Verlag
-
B. Waters, "Dual system encryption: Realizing fully secure IBE and HIBE under simple assumptions," in Advances in Cryptology (Lecture Notes in Computer Science), vol. 5677, S. Halevi, Ed. Berlin, Germany: Springer-Verlag, 2009, pp. 619-636.
-
(2009)
Advances in Cryptology (Lecture Notes in Computer Science)
, vol.5677
, pp. 619-636
-
-
Waters, B.1
-
14
-
-
77949581448
-
New techniques for dual system encryption and fully secure HIBE with short ciphertexts
-
D. Micciancio, Ed. Berlin, Germany: Springer-Verlag
-
A. Lewko and B. Waters, "New techniques for dual system encryption and fully secure HIBE with short ciphertexts," in Theory of Cryptography (Lecture Notes in Computer Science), vol. 5978, D. Micciancio, Ed. Berlin, Germany: Springer-Verlag, 2010, pp. 455-479.
-
(2010)
Theory of Cryptography (Lecture Notes in Computer Science)
, vol.5978
, pp. 455-479
-
-
Lewko, A.1
Waters, B.2
-
15
-
-
77954635558
-
Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption
-
H. Gilbert, Ed. Berlin, Germany: Springer-Verlag
-
A. Lewko, T. Okamoto, A. Sahai, K. Takashima, and B. Waters, "Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption," in Advances in Cryptology (Lecture Notes in Computer Science), vol. 6110, H. Gilbert, Ed. Berlin, Germany: Springer-Verlag, 2010, pp. 62-91.
-
(2010)
Advances in Cryptology (Lecture Notes in Computer Science)
, vol.6110
, pp. 62-91
-
-
Lewko, A.1
Okamoto, T.2
Sahai, A.3
Takashima, K.4
Waters, B.5
-
16
-
-
79953232002
-
Identity-based encryption secure against selective opening attack
-
Y. Ishai, Ed. Berlin, Germany: Springer-Verlag
-
M. Bellare, B. Waters, and S. Yilek, "Identity-based encryption secure against selective opening attack," in Theory of Cryptography (Lecture Notes in Computer Science), vol. 6597, Y. Ishai, Ed. Berlin, Germany: Springer-Verlag, 2011, pp. 235-252.
-
(2011)
Theory of Cryptography (Lecture Notes in Computer Science)
, vol.6597
, pp. 235-252
-
-
Bellare, M.1
Waters, B.2
Yilek, S.3
-
17
-
-
84858234376
-
Adaptively secure broadcast encryption with short ciphertexts
-
B. Malek and A. Miri, "Adaptively secure broadcast encryption with short ciphertexts," IJ Netw. Secur., vol. 14, no. 2, pp. 71-79, 2012.
-
(2012)
IJ Netw. Secur.
, vol.14
, Issue.2
, pp. 71-79
-
-
Malek, B.1
Miri, A.2
-
18
-
-
62649173578
-
Fully CCA2 secure identity based broadcast encryption without random oracles
-
May
-
Y. Ren and D. Gu, "Fully CCA2 secure identity based broadcast encryption without random oracles," Inf. Process. Lett., vol. 109, no. 11, pp. 527-533, May 2009.
-
(2009)
Inf. Process. Lett.
, vol.109
, Issue.11
, pp. 527-533
-
-
Ren, Y.1
Gu, D.2
-
19
-
-
77955211933
-
Revocation systems with very small private keys
-
A. Lewko, A. Sahai, and B. Waters, "Revocation systems with very small private keys," in Proc. IEEE Symp. Secur. Privacy, May 2010, pp. 273-285.
-
Proc. IEEE Symp. Secur. Privacy, May 2010
, pp. 273-285
-
-
Lewko, A.1
Sahai, A.2
Waters, B.3
-
21
-
-
84901650094
-
Dual system encryption via doubly selective security: Framework, fully secure functional encryption for regular languages, and more
-
P. Q. Nguyen and E. Oswald, Eds. Berlin, Germany: Springer-Verlag
-
N. Attrapadung, "Dual system encryption via doubly selective security: Framework, fully secure functional encryption for regular languages, and more," in Advances in Cryptology (Lecture Notes in Computer Science), vol. 8441, P. Q. Nguyen and E. Oswald, Eds. Berlin, Germany: Springer-Verlag, 2014, pp. 557-577.
-
(2014)
Advances in Cryptology (Lecture Notes in Computer Science)
, vol.8441
, pp. 557-577
-
-
Attrapadung, N.1
-
22
-
-
84921399997
-
Low overhead broadcast encryption from multilinear maps
-
D. Boneh, B. Waters, and M. Zhandry, "Low overhead broadcast encryption from multilinear maps," IACR Cryptol. ePrint Archive, vol. 2014, p. 195, 2014.
-
(2014)
IACR Cryptol. EPrint Archive
, vol.2014
, pp. 195
-
-
Boneh, D.1
Waters, B.2
Zhandry, M.3
-
23
-
-
79952511284
-
Functional encryption for inner product: Achieving constant-size ciphertexts with adaptive security or support for negation
-
Paris, France May [Online]. Available
-
th Int. Conf. Pract. Theory Public Key Cryptography (PKC), vol. 6056. Paris, France, May 2010, pp. 384-402. [Online]. Available: http://dx.doi.org/10.1007/978-3-642-13013-7
-
(2010)
Proc. 13th Int. Conf. Pract. Theory Public Key Cryptography (PKC)
, vol.6056
, pp. 384-402
-
-
Attrapadung, N.1
Libert, B.2
-
24
-
-
58349086247
-
Generalized identity based and broadcast encryption schemes
-
Melbourne, Vic., Australia Dec.
-
D. Boneh and M. Hamburg, "Generalized identity based and broadcast encryption schemes," in Proc. 14th Int. Conf. Theory Appl. Cryptol. Inf. Secur. Adv. Cryptol. (ASIACRYPT), vol. 5350. Melbourne, Vic., Australia, Dec. 2008, pp. 455-470.
-
(2008)
Proc. 14th Int. Conf. Theory Appl. Cryptol. Inf. Secur. Adv. Cryptol. (ASIACRYPT)
, vol.5350
, pp. 455-470
-
-
Boneh, D.1
Hamburg, M.2
-
25
-
-
84880292433
-
Efficient and adaptively secure broadcast encryption systems
-
Aug.
-
M. Zhang, B. Yang, Z. Chen, and T. Takagi, "Efficient and adaptively secure broadcast encryption systems," Secur. Commun. Netw., vol. 6, no. 8, pp. 1044-1052, Aug. 2013.
-
(2013)
Secur. Commun. Netw.
, vol.6
, Issue.8
, pp. 1044-1052
-
-
Zhang, M.1
Yang, B.2
Chen, Z.3
Takagi, T.4
-
26
-
-
82755161855
-
Adaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroups
-
Jan.
-
L. Zhang, Y. Hu, and Q. Wu, "Adaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroups," Math. Comput. Model., vol. 55, nos. 1-2, pp. 12-18, Jan. 2012.
-
(2012)
Math. Comput. Model.
, vol.55
, Issue.1-2
, pp. 12-18
-
-
Zhang, L.1
Hu, Y.2
Wu, Q.3
-
27
-
-
79958006339
-
Unbounded HIBE and attribute-based encryption
-
K. G. Paterson, Ed. Berlin, Germany: Springer-Verlag
-
A. Lewko and B. Waters, "Unbounded HIBE and attribute-based encryption," in Advances in Cryptology (Lecture Notes in Computer Science), vol. 6632, K. G. Paterson, Ed. Berlin, Germany: Springer-Verlag, 2011, pp. 547-567.
-
(2011)
Advances in Cryptology (Lecture Notes in Computer Science)
, vol.6632
, pp. 547-567
-
-
Lewko, A.1
Waters, B.2
-
28
-
-
24144433396
-
Evaluating 2-DNF formulas on ciphertexts
-
J. Kilian, Ed. Berlin, Germany: Springer-Verlag
-
D. Boneh, E.-J. Goh, and K. Nissim, "Evaluating 2-DNF formulas on ciphertexts," in Theory of Cryptography (Lecture Notes in Computer Science), vol. 3378, J. Kilian, Ed. Berlin, Germany: Springer-Verlag, 2005, pp. 325-341.
-
(2005)
Theory of Cryptography (Lecture Notes in Computer Science)
, vol.3378
, pp. 325-341
-
-
Boneh, D.1
Goh, E.-J.2
Nissim, K.3
-
29
-
-
84879866739
-
Comparing the pairing efficiency over compositeorder and prime-order elliptic curves
-
M. Jacobson, Jr., M. Locasto, P. Mohassel, and R. Safavi-Naini, Eds. Berlin, Germany: Springer-Verlag
-
A. Guillevic, "Comparing the pairing efficiency over compositeorder and prime-order elliptic curves," in Applied Cryptography and Network Security (Lecture Notes in Computer Science), vol. 7954, M. Jacobson, Jr., M. Locasto, P. Mohassel, and R. Safavi-Naini, Eds. Berlin, Germany: Springer-Verlag, 2013, pp. 357-372.
-
(2013)
Applied Cryptography and Network Security (Lecture Notes in Computer Science)
, vol.7954
, pp. 357-372
-
-
Guillevic, A.1
-
30
-
-
84946820591
-
Unbelievable security matching AES security using public key systems
-
A. K. Lenstra, "Unbelievable security matching AES security using public key systems," in Proc. 7th Int. Conf. Theory Appl. Cryptol. Inf. Secur. Adv. Cryptol. (ASIACRYPT), Gold Coast, Qld, Australia, Dec. 2001, pp. 67-86.
-
Proc. 7th Int. Conf. Theory Appl. Cryptol. Inf. Secur. Adv. Cryptol. (ASIACRYPT), Gold Coast, Qld, Australia, Dec. 2001
, pp. 67-86
-
-
Lenstra, A.K.1
|