-
1
-
-
84901650094
-
Dual system encryption via doubly selective security: Framework, fully secure functional encryption for regular languages, and more
-
In: Nguyen, P.Q., Oswald, E. (eds.), Springer, Heidelberg
-
Attrapadung, N.: Dual system encryption via doubly selective security: Framework, fully secure functional encryption for regular languages, and more. In: Nguyen, P.Q., Oswald, E. (eds.) EUROCRYPT 2014. LNCS, vol. 8441, pp. 557-577. Springer, Heidelberg (2014)
-
(2014)
EUROCRYPT 2014. LNCS
, vol.8441
, pp. 557-577
-
-
Attrapadung, N.1
-
2
-
-
84857740135
-
-
In: Catalano, et al. (eds.)
-
Attrapadung, N., Libert, B., de Panafieu, E.: Expressive key-policy attribute-based encryption with constant-size ciphertexts. In: Catalano, et al. (eds.) 7, pp. 90-108
-
Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts
, vol.7
, pp. 90-108
-
-
Attrapadung, N.1
Libert, B.2
De Panafieu, E.3
-
4
-
-
38049157409
-
-
In: Cramer (ed.)
-
Boneh, D., Boyen, X., Goh, E.J.: Hierarchical identity based encryption with constant size ciphertext. In: Cramer (ed.) 11, pp. 440-456
-
Hierarchical Identity Based Encryption with Constant Size Ciphertext
, vol.11
, pp. 440-456
-
-
Boneh, D.1
Boyen, X.2
Goh, E.J.3
-
5
-
-
35048887476
-
Short group signatures
-
In: Franklin, M. (ed.), Springer, Heidelberg
-
Boneh, D., Boyen, X., Shacham, H.: Short group signatures. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 41-55. Springer, Heidelberg (2004)
-
(2004)
CRYPTO 2004. LNCS
, vol.3152
, pp. 41-55
-
-
Boneh, D.1
Boyen, X.2
Shacham, H.3
-
6
-
-
33745166648
-
Collusion resistant broadcast encryption with short ciphertexts and private keys
-
In: Shoup, V. (ed.), Springer, Heidelberg
-
Boneh, D., Gentry, C., Waters, B.: Collusion resistant broadcast encryption with short ciphertexts and private keys. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 258-275. Springer, Heidelberg (2005)
-
(2005)
CRYPTO 2005. LNCS
, vol.3621
, pp. 258-275
-
-
Boneh, D.1
Gentry, C.2
Waters, B.3
-
7
-
-
84927674141
-
-
(eds.), Springer, Heidelberg
-
Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.): PKC 2011. LNCS, vol. 6571. Springer, Heidelberg (2011)
-
(2011)
PKC 2011. LNCS
, vol.6571
-
-
Catalano, D.1
Fazio, N.2
Gennaro, R.3
Nicolosi, A.4
-
8
-
-
84874307015
-
Fully secure attribute-based systems with short ciphertexts/signatures and threshold access structures
-
In: Dawson, E. (ed.), Springer, Heidelberg
-
Chen, C., Chen, J., Lim, H.W., Zhang, Z., Feng, D., Ling, S., Wang, H.: Fully secure attribute-based systems with short ciphertexts/signatures and threshold access structures. In: Dawson, E. (ed.) RSA 2013. LNCS, vol. 7779, pp. 50-67. Springer, Heidelberg (2013)
-
(2013)
RSA 2013. LNCS
, vol.7779
, pp. 50-67
-
-
Chen, C.1
Chen, J.2
Lim, H.W.3
Zhang, Z.4
Feng, D.5
Ling, S.6
Wang, H.7
-
9
-
-
84927631425
-
Semi-adaptive attribute-based encryption and improved delegation for boolean formula. To appear in SCN 2014
-
Chen, J., Wee, H.: Semi-adaptive attribute-based encryption and improved delegation for boolean formula. To appear in SCN 2014. IACR Cryptology ePrint Archive 2014, 465 (2014)
-
(2014)
IACR Cryptology Eprint Archive
, vol.2014
, pp. 465
-
-
Chen, J.1
Wee, H.2
-
11
-
-
77958051471
-
-
(ed.), Springer, Heidelberg
-
Cramer, R. (ed.): EUROCRYPT 2005. LNCS, vol. 3494. Springer, Heidelberg (2005)
-
(2005)
EUROCRYPT 2005. LNCS
, vol.3494
-
-
Cramer, R.1
-
12
-
-
38149117029
-
Identity-based broadcast encryption with constant size ciphertexts and private keys
-
In: Kurosawa, K. (ed.), Springer, Heidelberg
-
Delerablèe, C.: Identity-based broadcast encryption with constant size ciphertexts and private keys. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 200-215. Springer, Heidelberg (2007)
-
(2007)
ASIACRYPT 2007. LNCS
, vol.4833
, pp. 200-215
-
-
Delerablèe, C.1
-
13
-
-
70350635850
-
A ciphertext-policy attribute-based encryption scheme with constant ciphertext length
-
In: Bao, F., Li, H., Wang, G. (eds.), Springer, Heidelberg
-
Emura, K., Miyaji, A., Nomura, A., Omote, K., Soshi, M.: A ciphertext-policy attribute-based encryption scheme with constant ciphertext length. In: Bao, F., Li, H., Wang, G. (eds.) ISPEC 2009. LNCS, vol. 5451, pp. 13-23. Springer, Heidelberg (2009)
-
(2009)
ISPEC 2009. LNCS
, vol.5451
, pp. 13-23
-
-
Emura, K.1
Miyaji, A.2
Nomura, A.3
Omote, K.4
Soshi, M.5
-
14
-
-
84884481521
-
Attribute-based encryption for circuits from multilinear maps
-
In: Canetti, R., Garay, J.A. (eds.), Springer, Heidelberg
-
Garg, S., Gentry, C., Halevi, S., Sahai, A., Waters, B.: Attribute-based encryption for circuits from multilinear maps. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part II. LNCS, vol. 8043, pp. 479-499. Springer, Heidelberg (2013)
-
(2013)
CRYPTO 2013, Part II. LNCS
, vol.8043
, pp. 479-499
-
-
Garg, S.1
Gentry, C.2
Halevi, S.3
Sahai, A.4
Waters, B.5
-
16
-
-
84879825205
-
Attribute-based encryption for circuits
-
Boneh, D., Roughgarden, T., Feigenbaum, J. (eds.), ACM
-
Gorbunov, S., Vaikuntanathan, V., Wee, H.: Attribute-based encryption for circuits. In: Boneh, D., Roughgarden, T., Feigenbaum, J. (eds.) STOC, pp. 545-554. ACM (2013)
-
(2013)
STOC
, pp. 545-554
-
-
Gorbunov, S.1
Vaikuntanathan, V.2
Wee, H.3
-
17
-
-
79952523217
-
R`afols, C.: Constant size ciphertexts in threshold attribute-based encryption
-
In: Nguyen, P.Q., Pointcheval, D. (eds.), Springer, Heidelberg
-
Herranz, J., Laguillaumie, F., R`afols, C.: Constant size ciphertexts in threshold attribute-based encryption. In: Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. LNCS, vol. 6056, pp. 19-34. Springer, Heidelberg (2010)
-
(2010)
PKC 2010. LNCS
, vol.6056
, pp. 19-34
-
-
Herranz, J.1
Laguillaumie, F.2
-
18
-
-
79951783454
-
Attribute-based signatures
-
In: Kiayias, A. (ed.), Springer, Heidelberg
-
Maji, H.K., Prabhakaran, M., Rosulek, M.: Attribute-based signatures. In: Kiayias, A. (ed.) CT-RSA 2011. LNCS, vol. 6558, pp. 376-392. Springer, Heidelberg (2011)
-
(2011)
CT-RSA 2011. LNCS
, vol.6558
, pp. 376-392
-
-
Maji, H.K.1
Prabhakaran, M.2
Rosulek, M.3
-
19
-
-
0036475666
-
A new traitor tracing. IEICE Trans
-
Mitsunari, S., Sakai, R., Kasahara, M.: A new traitor tracing. IEICE Trans. Fundamentals E85-A(2), 481-484 (2002)
-
(2002)
Fundamentals E85-A(2)
, pp. 481-484
-
-
Mitsunari, S.1
Sakai, R.2
Kasahara, M.3
-
20
-
-
84871859795
-
Efficient (Hierarchical) inner-product encryption tightly reduced from the decisional linear assumption. IEICE Trans
-
Okamoto, T., Takashima, K.: Efficient (hierarchical) inner-product encryption tightly reduced from the decisional linear assumption. IEICE Trans. Fundamentals E96-A(1), 42-52 (2013)
-
(2013)
Fundamentals E96-A(1)
, pp. 42-52
-
-
Okamoto, T.1
Takashima, K.2
-
21
-
-
72449208663
-
Hierarchical predicate encryption for inner-products
-
In: Matsui, M. (ed.), Springer, Heidelberg
-
Okamoto, T., Takashima, K.: Hierarchical predicate encryption for inner-products. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 214-231. Springer, Heidelberg (2009)
-
(2009)
ASIACRYPT 2009. LNCS
, vol.5912
, pp. 214-231
-
-
Okamoto, T.1
Takashima, K.2
-
22
-
-
77957011503
-
Fully secure functional encryption with general relations from the decisional linear assumption
-
In: Rabin, T. (ed.), Springer, Heidelberg, full version
-
Okamoto, T., Takashima, K.: Fully secure functional encryption with general relations from the decisional linear assumption. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 191-208. Springer, Heidelberg (2010), full version is available at http://eprint.iacr.org/2010/563
-
(2010)
CRYPTO 2010. LNCS
, vol.6223
, pp. 191-208
-
-
Okamoto, T.1
Takashima, K.2
-
23
-
-
83755161618
-
Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption
-
In: Lin, D., Tsudik, G., Wang, X. (eds.), Springer, Heidelberg, full version
-
Okamoto, T., Takashima, K.: Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption. In: Lin, D., Tsudik, G., Wang, X. (eds.) CANS 2011. LNCS, vol. 7092, pp. 138-159. Springer, Heidelberg (2011), full version is available at http://eprint.iacr.org/2011/648
-
(2011)
CANS 2011. LNCS
, vol.7092
, pp. 138-159
-
-
Okamoto, T.1
Takashima, K.2
-
24
-
-
84927590323
-
-
In: Catalano, et al. (eds.), full version
-
Okamoto, T., Takashima, K.: Efficient attribute-based signatures for non-monotone predicates in the standard model. In: Catalano, et al. (eds.) 7, pp. 35-52, full version is available at http://eprint.iacr.org/2011/700
-
Efficient Attribute-Based Signatures for Non-Monotone Predicates in the Standard Model
, vol.7
, pp. 35-52
-
-
Okamoto, T.1
Takashima, K.2
-
26
-
-
84861691788
-
Solving a discrete logarithm problem with auxiliary input on a 160-bit elliptic curve
-
In: Fischlin, M., Buchmann, J., Manulis, M. (eds.), Springer, Heidelberg
-
Sakemi, Y., Hanaoka, G., Izu, T., Takenaka, M., Yasuda, M.: Solving a discrete logarithm problem with auxiliary input on a 160-bit elliptic curve. In: Fischlin, M., Buchmann, J., Manulis, M. (eds.) PKC 2012. LNCS, vol. 7293, pp. 595-608. Springer, Heidelberg (2012)
-
(2012)
PKC 2012. LNCS
, vol.7293
, pp. 595-608
-
-
Sakemi, Y.1
Hanaoka, G.2
Izu, T.3
Takenaka, M.4
Yasuda, M.5
-
27
-
-
84927612467
-
Expressive attribute-based encryption with constant-size ciphertexts from the decisional linear assumption
-
Takashima, K.: Expressive attribute-based encryption with constant-size ciphertexts from the decisional linear assumption. IACR Cryptology ePrint Archive 2014, 207 (2014)
-
(2014)
IACR Cryptology Eprint Archive
, vol.2014
, pp. 207
-
-
Takashima, K.1
-
28
-
-
84899059463
-
-
Vaudenay, S. (ed.), Springer, Heidelberg
-
Vaudenay, S. (ed.): EUROCRYPT 2006. LNCS, vol. 4004. Springer, Heidelberg (2006)
-
(2006)
EUROCRYPT 2006. LNCS
, vol.4004
-
-
-
29
-
-
70350345210
-
Dual system encryption: Realizing fully secure IBE and HIBE under simple assumptions
-
In: Halevi, S. (ed.), Springer, Heidelberg
-
Waters, B.: Dual system encryption: Realizing fully secure IBE and HIBE under simple assumptions. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 619-636. Springer, Heidelberg (2009)
-
(2009)
CRYPTO 2009. LNCS
, vol.5677
, pp. 619-636
-
-
Waters, B.1
-
30
-
-
84958551684
-
A framework and compact constructions for non-monotonic attribute-based encryption
-
In: Krawczyk, H. (ed.), Springer, Heidelberg
-
Yamada, S., Attrapadung, N., Hanaoka, G., Kunihiro, N.: A framework and compact constructions for non-monotonic attribute-based encryption. In: Krawczyk, H. (ed.) PKC 2014. LNCS, vol. 8383, pp. 275-292. Springer, Heidelberg (2014)
-
(2014)
PKC 2014. LNCS
, vol.8383
, pp. 275-292
-
-
Yamada, S.1
Attrapadung, N.2
Hanaoka, G.3
Kunihiro, N.4
|