-
2
-
-
58549086614
-
Type-based proxy re-encryption and its construction
-
Q. Tang, Type-based proxy re-encryption and its construction, in: Indocrypt'08, 2008, pp. 130-144. http://dx.doi.org/10.1007/978-3-540-89754-5-11.
-
(2008)
Indocrypt'08
, pp. 130-144
-
-
Tang, Q.1
-
3
-
-
77952320634
-
Conditional proxy re-encryption secure against chosen-ciphertext attack
-
J. Weng, R.H. Deng, X. Ding, C.-K. Chu, J. Lai, Conditional proxy re-encryption secure against chosen-ciphertext attack, in: ASIACCS'09, 2009, pp. 322-332. http://dx.doi.org/10.1145/1533057.1533100.
-
(2009)
ASIACCS'09
, pp. 322-332
-
-
Weng, J.1
Deng, R.H.2
Ding, X.3
Chu, C.-K.4
Lai, J.5
-
5
-
-
84968708831
-
-
European network and information security agency: Cloud computing risk assessment November
-
European network and information security agency: Cloud computing risk assessment, November 2009. http://www.enisa.europa.eu/act/rm/-les/deliverables/cloud-computing-risk-assessment.
-
(2009)
-
-
-
7
-
-
70350376239
-
Efficient conditional proxy re-encryption with chosen-ciphertext security
-
ISC'09 LNCS
-
J. Weng, Y. Yang, Q. Tang, R.H. Deng, and F. Bao Efficient conditional proxy re-encryption with chosen-ciphertext security 12th International Conference on Information Security ISC'09 LNCS vol. 5735 2009 151 166 10.1007/978-3-642-04474-8-13
-
(2009)
12th International Conference on Information Security
, vol.5735
, pp. 151-166
-
-
Weng, J.1
Yang, Y.2
Tang, Q.3
Deng, R.H.4
Bao, F.5
-
8
-
-
34548731375
-
Ciphertext-policy attribute-based encryption
-
J. Bethencourt, A. Sahai, B. Waters, Ciphertext-policy attribute-based encryption, in: IEEE Symposium on Security & Privacy, S&P'07, 2007, pp. 321-334. http://dx.doi.org/10.1109/SP.2007.11.
-
(2007)
IEEE Symposium on Security & Privacy, S&P'07
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
9
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
V. Goyal, O. Pandy, A. Sahai, B. Waters, Attribute-based encryption for fine-grained access control of encrypted data, in: ACM Computer and Communications Security Conference, CCS'06, 2006, pp. 89-98. http://dx.doi.org/10.1145/1180405.1180418.
-
(2006)
ACM Computer and Communications Security Conference, CCS'06
, pp. 89-98
-
-
Goyal, V.1
Pandy, O.2
Sahai, A.3
Waters, B.4
-
10
-
-
84910007051
-
Fine-grained conditional proxy re-encryption and application
-
ProvSec'14 LNCS
-
Y. Yang, H. Lu, J. Weng, Y. Zhang, and K. Sakurai Fine-grained conditional proxy re-encryption and application 8th International Conference on Provable Security ProvSec'14 LNCS vol. 8782 2014 206 222 10.1007/978-3-319-12475-9-15
-
(2014)
8th International Conference on Provable Security
, vol.8782
, pp. 206-222
-
-
Yang, Y.1
Lu, H.2
Weng, J.3
Zhang, Y.4
Sakurai, K.5
-
11
-
-
33745218758
-
Improved proxy re-encryption schemes with applications to secure distributed storage
-
G. Ateniese, K. Fu, M. Green, and S. Hohenberger Improved proxy re-encryption schemes with applications to secure distributed storage ACM Trans. Inf. Syst. Secur. (TISSEC) 9 1 2006 1 30 10.1145/1127345.1127346
-
(2006)
ACM Trans. Inf. Syst. Secur. (TISSEC)
, vol.9
, Issue.1
, pp. 1-30
-
-
Ateniese, G.1
Fu, K.2
Green, M.3
Hohenberger, S.4
-
12
-
-
77952361637
-
Chosen-ciphertext secure proxy re-encryption
-
R. Canetti, S. Hohenberger, Chosen-ciphertext secure proxy re-encryption, in: ACM CCS 2007, 2007, pp. 185-194. http://dx.doi.org/10.1145/1315245.1315269.
-
(2007)
ACM CCS 2007
, pp. 185-194
-
-
Canetti, R.1
Hohenberger, S.2
-
13
-
-
40249113119
-
Unidirectional chosen-ciphertext secure proxy re-encryption
-
LNCS
-
B. Libert, and D. Vergnaud Unidirectional chosen-ciphertext secure proxy re-encryption PKC'08 LNCS vol. 4929 2008 360 379 10.1007/978-3-540-78440-1-21
-
(2008)
PKC'08
, vol.4929
, pp. 360-379
-
-
Libert, B.1
Vergnaud, D.2
-
15
-
-
58449122500
-
Chosen-ciphertext secure proxy re-encryption without pairings
-
R.H. Deng, J. Weng, S. Liu, K. Chen, Chosen-ciphertext secure proxy re-encryption without pairings, in: CANS 2008, 2008, pp. 1-17. http://dx.doi.org/10.1007/978-3-540-89641-8-1.
-
(2008)
CANS 2008
, pp. 1-17
-
-
Deng, R.H.1
Weng, J.2
Liu, S.3
Chen, K.4
-
16
-
-
67049100266
-
Cca-secure proxy re-encryption without pairings
-
LNCS
-
J. Shao, and Z. Cao Cca-secure proxy re-encryption without pairings PKC'09 LNCS vol. 5443 2009 357 376 10.1007/978-3-642-00468-1-20
-
(2009)
PKC'09
, vol.5443
, pp. 357-376
-
-
Shao, J.1
Cao, Z.2
-
17
-
-
77953491924
-
-
iacr eprint: eprint.iacr.org/2009/189.pdf
-
J. Weng, S.S.M. Chow, Y. Yang, R. Deng, Efficient unidirectional proxy re-encryption, 2009, iacr eprint: eprint.iacr.org/2009/189.pdf.
-
(2009)
Efficient Unidirectional Proxy Re-encryption
-
-
Weng, J.1
Chow, S.S.M.2
Yang, Y.3
Deng, R.4
-
18
-
-
77952362084
-
Attribute-based proxy ee-encrytpion with delegating capabilities
-
X. Liang, Z. Cao, H. Lin, J. Shao, Attribute-based proxy ee-encrytpion with delegating capabilities, in: ACM ASIACCS'09, 2009, pp. 276-286. http://dx.doi.org/10.1145/1533057.1533094.
-
(2009)
ACM ASIACCS'09
, pp. 276-286
-
-
Liang, X.1
Cao, Z.2
Lin, H.3
Shao, J.4
-
19
-
-
78650865160
-
Ciphertext policy attribute-based proxy re-encryption
-
S. Luo, J. Hu, Z. Chen, Ciphertext policy attribute-based proxy re-encryption, in: International Conference on Information and Communications Security, ICICS'10, 2010, pp. 401-415. http://dx.doi.org/10.1007/978-3-642-17650-0-28.
-
(2010)
International Conference on Information and Communications Security, ICICS'10
, pp. 401-415
-
-
Luo, S.1
Hu, J.2
Chen, Z.3
-
20
-
-
84919491069
-
A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing
-
K. Liang, et al. A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing, Future Gener. Comput. Syst. http://dx.doi.org/10.1016/j.future.2014.11.016, in press.
-
Future Gener. Comput. Syst
-
-
Liang, K.1
-
21
-
-
84928213141
-
A ciphertext-policy attribute-based proxy re-encryption scheme for data sharing in public clouds
-
K. Liang, L. Fang, D.S. Wong, and W. Susilo A ciphertext-policy attribute-based proxy re-encryption scheme for data sharing in public clouds Concurr. Comput.: Pract. Exper. 27 8 2015 2004 2027 10.1002/cpe.3397
-
(2015)
Concurr. Comput.: Pract. Exper.
, vol.27
, Issue.8
, pp. 2004-2027
-
-
Liang, K.1
Fang, L.2
Wong, D.S.3
Susilo, W.4
-
22
-
-
84942521953
-
Outsourcing the re-encryption key generation: Flexible ciphertext-policy attribute-based proxy re-encryption
-
Y. Kawai, Outsourcing the re-encryption key generation: Flexible ciphertext-policy attribute-based proxy re-encryption, in: International Conference on Information Security Practice and Experience, ISPEC'15, 2015, pp. 301-315. http://dx.doi.org/10.1007/978-3-319-17533-1-21.
-
(2015)
International Conference on Information Security Practice and Experience, ISPEC'15
, pp. 301-315
-
-
Kawai, Y.1
-
23
-
-
84865465739
-
Dynamic credentials and ciphertext delegation for attribute-based encryption
-
LNCS
-
A. Sahai, H. Seyalioglu, and B. Waters Dynamic credentials and ciphertext delegation for attribute-based encryption Crypto'12 LNCS vol. 7417 2012 199 217 10.1007/978-3-642-32009-5-13
-
(2012)
Crypto'12
, vol.7417
, pp. 199-217
-
-
Sahai, A.1
Seyalioglu, H.2
Waters, B.3
-
24
-
-
79551617997
-
Attribute-based conditional proxy re-encryption with chosen-ciphertext security
-
J. Zhao, D. Feng, Z. Zhang, Attribute-based conditional proxy re-encryption with chosen-ciphertext security, in: IEEE GLOBECOM 2010, 2010, pp. 1-6. http://dx.doi.org/10.1109/GLOCOM.2010.5684045.
-
(2010)
IEEE GLOBECOM 2010
, pp. 1-6
-
-
Zhao, J.1
Feng, D.2
Zhang, Z.3
-
25
-
-
35048852705
-
Chosen-ciphertext security from identity-based encryption
-
LNCS
-
R. Canetti, S. Halevi, and J. Katz Chosen-ciphertext security from identity-based encryption Advances in Cryptology-Eurocrypt'04 LNCS vol. 3027 2004 207 222 10.1007/978-3-540-24676-3-13
-
(2004)
Advances in Cryptology-Eurocrypt'04
, vol.3027
, pp. 207-222
-
-
Canetti, R.1
Halevi, S.2
Katz, J.3
-
26
-
-
0000561923
-
Secure integration of asymmetric and symmetric encryption schemes
-
LNCS
-
E. Fujisaki, and T. Okamoto Secure integration of asymmetric and symmetric encryption schemes Advances in Cryptology-Crypto'09 LNCS vol. 1666 1999 80 101 10.1007/s00145-011-9114-1
-
(1999)
Advances in Cryptology-Crypto'09
, vol.1666
, pp. 80-101
-
-
Fujisaki, E.1
Okamoto, T.2
-
27
-
-
84863280137
-
Generic construction of chosen ciphertext secure proxy re-encryption
-
G. Hanaoka, Y. Kawai, N. Kunihiro, T. Matsuda, J. Weng, R. Zhang, Y. Zhao, Generic construction of chosen ciphertext secure proxy re-encryption, in: CT-RSA'12, 2012, pp. 349-364. http://dx.doi.org/10.1007/978-3-642-27954-6-22.
-
(2012)
CT-RSA'12
, pp. 349-364
-
-
Hanaoka, G.1
Kawai, Y.2
Kunihiro, N.3
Matsuda, T.4
Weng, J.5
Zhang, R.6
Zhao, Y.7
-
28
-
-
84942550160
-
Lower bounds for discrete logarithms and related problems
-
V. Shoup, Lower bounds for discrete logarithms and related problems, in: Advances in Cryptology-Eurocrypt'97, 1997, pp. 256-266. http://dx.doi.org/10.1007/3-540-69053-0-18.
-
(1997)
Advances in Cryptology-Eurocrypt'97
, pp. 256-266
-
-
Shoup, V.1
-
29
-
-
84976779342
-
Fast probabilistic algorithms for verification of polynomial identities
-
J. Schwartz Fast probabilistic algorithms for verification of polynomial identities J. ACM 27 4 1980 701 717 10.1145/322217.322225
-
(1980)
J. ACM
, vol.27
, Issue.4
, pp. 701-717
-
-
Schwartz, J.1
-
31
-
-
79952521560
-
Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization
-
B. Waters, Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization, in: PKC'11, 2011, pp. 53-70. http://dx.doi.org/10.1007/978-3-642-19379-8-4.
-
(2011)
PKC'11
, pp. 53-70
-
-
Waters, B.1
-
32
-
-
74049120601
-
Attribute-based encryption with non-monotonic access structures
-
R. Ostrovsky, A. Sahai, B. Waters, Attribute-based encryption with non-monotonic access structures, in: ACM CCS'07, 2007, pp. 195-203. http://dx.doi.org/10.1145/1315245.1315270.
-
(2007)
ACM CCS'07
, pp. 195-203
-
-
Ostrovsky, R.1
Sahai, A.2
Waters, B.3
-
33
-
-
44449129423
-
Predicate encryption supporting disjunctions, polynomial equations, and inner products
-
LNCS
-
J. Katz, A. Sahai, and B. Waters Predicate encryption supporting disjunctions, polynomial equations, and inner products Advances in Cryptology-Eurocrypt'08 LNCS vol. 4965 2008 146 162 10.1007/s00145-012-9119-4
-
(2008)
Advances in Cryptology-Eurocrypt'08
, vol.4965
, pp. 146-162
-
-
Katz, J.1
Sahai, A.2
Waters, B.3
-
34
-
-
79953230454
-
Functional encryption: Definitions and challenges
-
D. Boneh, A. Sahai, B. Waters, Functional encryption: Definitions and challenges, in: Theory of Cryptography Conference, TCC'11, 2011, pp. 253-273. http://dx.doi.org/10.1007/978-3-642-19571-6-16.
-
(2011)
Theory of Cryptography Conference, TCC'11
, pp. 253-273
-
-
Boneh, D.1
Sahai, A.2
Waters, B.3
-
35
-
-
77954635558
-
Fully secure funtional encryption: Attibute-based encryption and (hierarchial) inner product encryption
-
LNCS
-
A. Lewko, T. Okamoto, A. Sahai, T. Takashima, and B. Waters Fully secure funtional encryption: Attibute-based encryption and (hierarchial) inner product encryption Advances in Cryptology-Eurocrypt'10 LNCS vol. 6110 2010 62 91 10.1007/978-3-642-13190-5-4
-
(2010)
Advances in Cryptology-Eurocrypt'10
, vol.6110
, pp. 62-91
-
-
Lewko, A.1
Okamoto, T.2
Sahai, A.3
Takashima, T.4
Waters, B.5
-
36
-
-
72449201970
-
Attribute-based encryption supporting direct/indirect revocation modes
-
N. Attrapadung, H. Imai, Attribute-based encryption supporting direct/indirect revocation modes, in: IMA International Conference on Cryptography and Coding, 2009, pp. 278-300. http://dx.doi.org/10.1007/978-3-642-10868-6-17.
-
(2009)
IMA International Conference on Cryptography and Coding
, pp. 278-300
-
-
Attrapadung, N.1
Imai, H.2
-
37
-
-
78649998200
-
Hierarhical attribute-based encryption for fine-grained access control in cloud storage services
-
G. Wang, Q. Liu, J. Wu, Hierarhical attribute-based encryption for fine-grained access control in cloud storage services, in: ACM CCS'10, 2010, pp. 735-737. http://dx.doi.org/10.1145/1866307.1866414.
-
(2010)
ACM CCS'10
, pp. 735-737
-
-
Wang, G.1
Liu, Q.2
Wu, J.3
-
38
-
-
77953310709
-
Achieving secure, scalable, and fine-grained data access control in cloud computing
-
S. Yu, C. Wang, K. Ren, W. Lou, Achieving secure, scalable, and fine-grained data access control in cloud computing, in: IEEE INFOCOM'10, 2010, pp. 1-9. http://dx.doi.org/10.1109/INFCOM.2010.5462174.
-
(2010)
IEEE INFOCOM'10
, pp. 1-9
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
-
39
-
-
85084163661
-
A method for fast revocation of public key certificates and security capabilities
-
D. Boneh, X. Ding, G. Tsudik, C. Wong, A method for fast revocation of public key certificates and security capabilities, in: USENIX Security, 2001.
-
(2001)
USENIX Security
-
-
Boneh, D.1
Ding, X.2
Tsudik, G.3
Wong, C.4
-
41
-
-
84991821017
-
Fully-rcca-cca-secure ciphertext-policy attribute based encryption with security mediator
-
Y. Chen, L. Jiang, S. Yiu, M. Au, X. Wang, Fully-rcca-cca-secure ciphertext-policy attribute based encryption with security mediator, in: 16th International Conference on Information and Communications Security, ICICS'14, 2014, in press.
-
(2014)
16th International Conference on Information and Communications Security, ICICS'14
-
-
Chen, Y.1
Jiang, L.2
Yiu, S.3
Au, M.4
Wang, X.5
|