-
1
-
-
24944554962
-
Fuzzy identity-based encryption
-
R. Cramer, Ed. Berlin, Germany: Springer-Verlag
-
A. Sahai and B. Waters, "Fuzzy identity-based encryption," in Advances in Cryptology (Lecture Notes in Computer Science), vol. 3494, R. Cramer, Ed. Berlin, Germany: Springer-Verlag, 2005, pp. 457-473.
-
(2005)
Advances in Cryptology (Lecture Notes in Computer Science)
, vol.3494
, pp. 457-473
-
-
Sahai, A.1
Waters, B.2
-
2
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
V. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attribute-based encryption for fine-grained access control of encrypted data," in Proc. ACM Conf. Comput. Commun. Secur., 2006, pp. 89-98.
-
(2006)
Proc. ACM Conf. Comput. Commun. Secur
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
3
-
-
34548731375
-
Ciphertext-policy attributebased encryption
-
J. Bethencourt, A. Sahai, and B. Waters, "Ciphertext-policy attributebased encryption," in Proc. IEEE Symp. Secur. Privacy, May 2007, pp. 321-334.
-
(2007)
Proc. IEEE Symp. Secur. Privacy, May
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
4
-
-
79952521560
-
Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization
-
D. Catalano, N. Fazio, R. Gennaro, and A. Nicolosi, Eds. Berlin, Germany: Springer-Verlag
-
B. Waters, "Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization," in Public Key Cryptography (Lecture Notes in Computer Science), vol. 6571, D. Catalano, N. Fazio, R. Gennaro, and A. Nicolosi, Eds. Berlin, Germany: Springer-Verlag, 2011, pp. 53-70.
-
(2011)
Public Key Cryptography (Lecture Notes in Computer Science)
, vol.6571
, pp. 53-70
-
-
Waters, B.1
-
5
-
-
84889034631
-
Practical constructions and new proof methods for large universe attribute-based encryption
-
Y. Rouselakis and B. Waters, "Practical constructions and new proof methods for large universe attribute-based encryption," in Proc. ACM Conf. Comput. Commun. Secur., 2013, pp. 463-474.
-
(2013)
Proc. ACM Conf. Comput. Commun. Secur
, pp. 463-474
-
-
Rouselakis, Y.1
Waters, B.2
-
7
-
-
84856602103
-
Attribute-based encryption schemes with constant-size ciphertexts
-
Mar
-
N. Attrapadung, J. Herranz, F. Laguillaumie, B. Libert, E. de Panafieu, and C. Ràfols, "Attribute-based encryption schemes with constant-size ciphertexts," Theoretical Comput. Sci., vol. 422, pp. 15-38, Mar. 2012.
-
(2012)
Theoretical Comput. Sci
, vol.422
, pp. 15-38
-
-
Attrapadung, N.1
Herranz, J.2
Laguillaumie, F.3
Libert, B.4
De Panafieu, E.5
Ràfols, C.6
-
8
-
-
85076484262
-
Outsourcing the decryption of ABE ciphertexts
-
M. Green, S. Hohenberger, and B. Waters, "Outsourcing the decryption of ABE ciphertexts," in Proc. 20th USENIX Secur. Symp., 2011, p. 34.
-
(2011)
Proc. 20th USENIX Secur. Symp
, pp. 34
-
-
Green, M.1
Hohenberger, S.2
Waters, B.3
-
9
-
-
84880652100
-
Attribute-based encryption with verifiable outsourced decryption
-
Aug
-
J. Lai, R. H. Deng, C. Guan, and J. Weng, "Attribute-based encryption with verifiable outsourced decryption," IEEE Trans. Inf. Forensics Security, vol. 8, no. 8, pp. 1343-1354, Aug. 2013.
-
(2013)
IEEE Trans. Inf. Forensics Security
, vol.8
, Issue.8
, pp. 1343-1354
-
-
Lai, J.1
Deng, R.H.2
Guan, C.3
Weng, J.4
-
10
-
-
77957005936
-
Non-interactive verifiable computing: Outsourcing computation to untrusted workers
-
T. Rabin, Ed. Berlin, Germany: Springer-Verlag
-
R. Gennaro, C. Gentry, and B. Parno, "Non-interactive verifiable computing: Outsourcing computation to untrusted workers," in Advances in Cryptology (Lecture Notes in Computer Science), vol. 6223, T. Rabin, Ed. Berlin, Germany: Springer-Verlag, 2010, pp. 465-482.
-
(2010)
Advances in Cryptology (Lecture Notes in Computer Science)
, vol.6223
, pp. 465-482
-
-
Gennaro, R.1
Gentry, C.2
Parno, B.3
-
11
-
-
77957002840
-
Improved delegation of computation using fully homomorphic encryption
-
T. Rabin, Ed. Berlin, Germany: Springer-Verlag
-
K.-M. Chung, Y. Kalai, and S. Vadhan, "Improved delegation of computation using fully homomorphic encryption," in Advances in Cryptology (Lecture Notes in Computer Science), vol. 6223, T. Rabin, Ed. Berlin, Germany: Springer-Verlag, 2010, pp. 483-501.
-
(2010)
Advances in Cryptology (Lecture Notes in Computer Science)
, vol.6223
, pp. 483-501
-
-
Chung, K.-M.1
Kalai, Y.2
Vadhan, S.3
-
12
-
-
78650755198
-
Secure delegation of elliptic-curve pairing
-
D. Gollmann, J.-L. Lanet, and J. Iguchi-Cartigny, Eds. Berlin, Germany: Springer-Verlag
-
B. Chevallier-Mames, J.-S. Coron, N. McCullagh, D. Naccache, and M. Scott, "Secure delegation of elliptic-curve pairing," in Smart Card Research and Advanced Application (Lecture Notes in Computer Science), vol. 6035, D. Gollmann, J.-L. Lanet, and J. Iguchi-Cartigny, Eds. Berlin, Germany: Springer-Verlag, 2010, pp. 24-35.
-
(2010)
Smart Card Research and Advanced Application (Lecture Notes in Computer Science)
, vol.6035
, pp. 24-35
-
-
Chevallier-Mames, B.1
Coron, J.-S.2
McCullagh, N.3
Naccache, D.4
Scott, M.5
-
13
-
-
70350642087
-
Fully homomorphic encryption using ideal lattices
-
C. Gentry, "Fully homomorphic encryption using ideal lattices," in Proc. STOC, 2009, pp. 169-178.
-
(2009)
Proc. STOC
, pp. 169-178
-
-
Gentry, C.1
-
14
-
-
79957974657
-
Implementing Gentry's fully-homomorphic encryption scheme
-
K. G. Paterson, Ed. Berlin, Germany: Springer-Verlag
-
C. Gentry and S. Halevi, "Implementing Gentry's fully-homomorphic encryption scheme," in Advances in Cryptology (Lecture Notes in Computer Science), vol. 6632, K. G. Paterson, Ed. Berlin, Germany: Springer-Verlag, 2011, pp. 129-148.
-
(2011)
Advances in Cryptology (Lecture Notes in Computer Science)
, vol.6632
, pp. 129-148
-
-
Gentry, C.1
Halevi, S.2
-
15
-
-
0027726717
-
Random oracles are practical: A paradigm for designing efficient protocols
-
M. Bellare and P. Rogaway, "Random oracles are practical: A paradigm for designing efficient protocols," in Proc. CCS, 1993, pp. 62-73.
-
(1993)
Proc. CCS
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
16
-
-
84894634556
-
Securely outsourcing attribute-based encryption with checkability
-
Aug., [Online]
-
J. Li, X. Huang, J. Li, X. Chen, and Y. Xiang, "Securely outsourcing attribute-based encryption with checkability," IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 4, pp. 2201-2210, Aug. 2014. [Online]. Available: http://ieeexplore.ieee.org/xpls/abs-all.jsp?arnumber=6642027
-
(2014)
IEEE Trans. Parallel Distrib. Syst
, vol.25
, Issue.4
, pp. 2201-2210
-
-
Li, J.1
Huang, X.2
Li, J.3
Chen, X.4
Xiang, Y.5
-
17
-
-
0003745894
-
-
Ph.D. dissertation, Dept. Comput. Sci., Israel Inst. Technol., Haifa, Israel
-
A. Beimel, "Secure schemes for secret sharing and key distribution," Ph.D. dissertation, Dept. Comput. Sci., Israel Inst. Technol., Haifa, Israel, 1996.
-
(1996)
Secure Schemes for Secret Sharing and Key Distribution
-
-
Beimel, A.1
-
18
-
-
52149117439
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data," SIAM J. Comput., vol. 38, no. 1, pp. 97-139, 2008.
-
(2008)
SIAM J. Comput
, vol.38
, Issue.1
, pp. 97-139
-
-
Dodis, Y.1
Ostrovsky, R.2
Reyzin, L.3
Smith, A.4
-
19
-
-
33745142417
-
Sequences of games: A tool for taming complexity in security proofs
-
New York Univ., New York, NY, USA, Tech. Rep. 2004/332, [Online]
-
V. Shoup, "Sequences of games: A tool for taming complexity in security proofs," Dept. Comput. Sci., New York Univ., New York, NY, USA, Tech. Rep. 2004/332, 2004. [Online]. Available: http://eprint.iacr.org/
-
(2004)
Dept. Comput. Sci
-
-
Shoup, V.1
-
20
-
-
35248875326
-
Relaxing chosen-ciphertext security
-
D. Boneh, Ed. Berlin, Germany: Springer-Verlag
-
R. Canetti, H. Krawczyk, and J. B. Nielsen, "Relaxing chosen-ciphertext security," in Advances in Cryptology (Lecture Notes in Computer Science), vol. 2729, D. Boneh, Ed. Berlin, Germany: Springer-Verlag, 2003, pp. 565-582.
-
(2003)
Advances in Cryptology (Lecture Notes in Computer Science)
, vol.2729
, pp. 565-582
-
-
Canetti, R.1
Krawczyk, H.2
Nielsen, J.B.3
|