-
1
-
-
24944554962
-
Fuzzy identity-based encryption
-
A. Sahai and B. Waters, "Fuzzy identity-based encryption, " in Proc. EUROCRYPT, 2005, pp. 457-473.
-
(2005)
Proc. EUROCRYPT
, pp. 457-473
-
-
Sahai, A.1
Waters, B.2
-
2
-
-
85076484262
-
Outsourcing the decryption of ABE ciphertexts
-
M. Green, S. Hohenberger, and B. Waters, "Outsourcing the decryption of ABE ciphertexts, " in Proc. USENIX Secur. Symp., 2011, p. 34.
-
(2011)
Proc. USENIX Secur. Symp
, pp. 34
-
-
Green, M.1
Hohenberger, S.2
Waters, B.3
-
3
-
-
84880652100
-
Attribute-based encryption with verifiable outsourced decryption
-
Aug.
-
J. Lai, R. H. Deng, C. Guan, and J. Weng, "Attribute-based encryption with verifiable outsourced decryption, " IEEE Trans. Inf. Forensics Security, vol. 8, no. 8, pp. 1343-1354, Aug. 2013.
-
(2013)
IEEE Trans. Inf. Forensics Security
, vol.8
, Issue.8
, pp. 1343-1354
-
-
Lai, J.1
Deng, R.H.2
Guan, C.3
Weng, J.4
-
4
-
-
34548731375
-
Ciphertext-policy attributebased encryption
-
May
-
J. Bethencourt, A. Sahai, and B. Waters, "Ciphertext-policy attributebased encryption, " in Proc. IEEE Symp. Secur. Privacy, May 2007, pp. 321-334.
-
(2007)
Proc IEEE Symp. Secur. Privacy
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
6
-
-
79952521560
-
Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization
-
B. Waters, "Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization, " in Proc. Public Key Cryptography, 2011, pp. 53-70.
-
(2011)
Proc. Public Key Cryptography
, pp. 53-70
-
-
Waters, B.1
-
7
-
-
77954635558
-
Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption
-
A. Lewko, T. Okamoto, A. Sahai, K. Takashima, and B. Waters, "Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption, " in Proc. EUROCRYPT, 2010, pp. 62-91.
-
(2011)
Proc. EUROCRYPT
, pp. 62-91
-
-
Lewko, A.1
Okamoto, T.2
Sahai, A.3
Takashima, K.4
Waters, B.5
-
8
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
V. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attribute-based encryption for fine-grained access control of encrypted data, " in Proc. ACM Conf. Comput. Commun. Secur., 2006, pp. 89-98.
-
(2006)
Proc ACM Conf. Comput. Commun. Secur
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
9
-
-
74049120601
-
Attribute-based encryption with non-monotonic access structures
-
R. Ostrovsky, A. Sahai, and B. Waters, "Attribute-based encryption with non-monotonic access structures, " in Proc. 14th ACM Conf. Comput. Commun. Secur., 2007, pp. 195-203.
-
(2007)
Proc. 14th ACM Conf. Comput. Commun. Secur
, pp. 195-203
-
-
Ostrovsky, R.1
Sahai, A.2
Waters, B.3
-
11
-
-
84948973494
-
Exposure-resilient functions and all-or-nothing transforms
-
R. Canetti, Y. Dodis, S. Halevi, E. Kushilevitz, and A. Sahai, "Exposure-resilient functions and all-or-nothing transforms, " in Proc. EUROCRYPT, 2000, pp. 453-469.
-
(2000)
Proc. EUROCRYPT
, pp. 453-469
-
-
Canetti, R.1
Dodis, Y.2
Halevi, S.3
Kushilevitz, E.4
Sahai, A.5
-
12
-
-
84856602103
-
Attribute-based encryption schemes with constant-size ciphertexts
-
Mar
-
N. Attrapadung, J. Herranz, F. Laguillaumie, B. Libert, E. de Panafieu, and C. Ràfols, "Attribute-based encryption schemes with constant-size ciphertexts, " Theoretical Comput. Sci., vol. 422, pp. 15-38, Mar. 2012.
-
(2012)
Theoretical Comput. Sci
, vol.422
, pp. 15-38
-
-
Attrapadung, N.1
Herranz, J.2
Laguillaumie, F.3
Libert, B.4
De Panafieu, E.5
Ràfols, C.6
-
14
-
-
78650755198
-
Secure delegation of elliptic-curve pairing
-
B. Chevallier-Mames, J.-S. Coron, N. McCullagh, D. Naccache, and M. Scott, "Secure delegation of elliptic-curve pairing, " in Proc. 9th Int. Conf. Smart Card Res. Adv. Appl., 2010, pp. 24-35.
-
(2011)
Proc. 9th Int. Conf. Smart Card Res. Adv. Appl
, pp. 24-35
-
-
Chevallier-Mames, B.1
Coron, J.-S.2
McCullagh, N.3
Naccache, D.4
Scott, M.5
-
15
-
-
38149085581
-
Efficient delegation of pairing computation
-
B. G. Kang, M. S. Lee, and J. H. Park, "Efficient delegation of pairing computation, " Cryptol. ePrint Arch., Rep. 2005/259, 2005. [Online]. Available: http://eprint.iacr.org/
-
(2005)
Cryptol. EPrint Arch., Rep
, vol.259
, pp. 2005
-
-
Kang, B.G.1
Lee, M.S.2
Park, J.H.3
-
16
-
-
38149111147
-
Batch pairing delegation
-
P. P. Tsang, S. S. Chow, and S. W. Smith, "Batch pairing delegation, " in Proc. 2nd Int. Workshop Adv. Inf. Comput. Secur., 2007, pp. 74-90.
-
(2007)
Proc. 2nd Int. Workshop Adv. Inf. Comput. Secur
, pp. 74-90
-
-
Tsang, P.P.1
Chow, S.S.2
Smith, S.W.3
-
17
-
-
84957718934
-
Divertible protocols and atomic proxy cryptography
-
M. Blaze, G. Bleumer, and M. Strauss, "Divertible protocols and atomic proxy cryptography, " in Proc. EUROCRYPT, 1998, pp. 127-144.
-
(1998)
Proc. EUROCRYPT
, pp. 127-144
-
-
Blaze, M.1
Bleumer, G.2
Strauss, M.3
-
18
-
-
33745218758
-
Improved proxy re-encryption schemes with applications to secure distributed storage
-
Feb
-
G. Ateniese, K. Fu, M. Green, and S. Hohenberger, "Improved proxy re-encryption schemes with applications to secure distributed storage, " ACM Trans. Inf. Syst. Secur., vol. 9, no. 1, pp. 1-30, Feb. 2006.
-
(2006)
ACM Trans. Inf. Syst. Secur
, vol.9
, Issue.1
, pp. 1-30
-
-
Ateniese, G.1
Fu, K.2
Green, M.3
Hohenberger, S.4
-
19
-
-
77957005936
-
Non-interactive verifiable computing: Outsourcing computation to untrusted workers
-
R. Gennaro, C. Gentry, and B. Parno, "Non-interactive verifiable computing: Outsourcing computation to untrusted workers, " in Proc. CRYPTO, 2010, pp. 465-482.
-
(2011)
Proc. CRYPTO
, pp. 465-482
-
-
Gennaro, R.1
Gentry, C.2
Parno, B.3
-
20
-
-
77957002840
-
Improved delegation of computation using fully homomorphic encryption
-
K.-M. Chung, Y. Kalai, and S. Vadhan, "Improved delegation of computation using fully homomorphic encryption, " in Proc. CRYPTO, 2010, pp. 483-501.
-
(2011)
Proc. CRYPTO
, pp. 483-501
-
-
Chung, K.-M.1
Kalai, Y.2
Vadhan, S.3
-
21
-
-
84884802064
-
Fine-grained access control system based on outsourced attribute-based encryption
-
J. Li, X. Chen, J. Li, C. Jia, J. Ma, and W. Lou, "Fine-grained access control system based on outsourced attribute-based encryption, " in Proc. 18th Eur. Symp. Res. Comput. Secur. (ESORICS), 2013, pp. 592-609.
-
(2013)
Proc. 18th Eur. Symp. Res. Comput. Secur. (ESORICS
, pp. 592-609
-
-
Li, J.1
Chen, X.2
Li, J.3
Jia, C.4
Ma, J.5
Lou, W.6
-
22
-
-
84894634556
-
Securely outsourcing attribute-based encryption with checkability
-
Aug.
-
J. Li, X. Huang, J. Li, X. Chen, and Y. Xiang, "Securely outsourcing attribute-based encryption with checkability, " IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 8, pp. 2201-2210, Aug. 2013.
-
(2013)
IEEE Trans. Parallel Distrib. Syst
, vol.25
, Issue.8
, pp. 2201-2210
-
-
Li, J.1
Huang, X.2
Li, J.3
Chen, X.4
Xiang, Y.5
-
24
-
-
85122602758
-
-
Chapman & Hall/CRC Cryptography and Network Security Series). London, U.K.: Chapman & Hall
-
J. Katz and Y. Lindell, Introduction to Modern Cryptography (Chapman & Hall/CRC Cryptography and Network Security Series). London, U.K.: Chapman & Hall, 2007.
-
(2007)
Introduction to Modern Cryptography
-
-
Katz, J.1
Lindell, Y.2
-
25
-
-
77957013995
-
Cryptographic extraction and key derivation: The HKDF scheme
-
H. Krawczyk, "Cryptographic extraction and key derivation: The HKDF scheme, " in Proc. CRYPTO, 2010, pp. 631-648.
-
(2011)
Proc. CRYPTO
, pp. 631-648
-
-
Krawczyk, H.1
-
26
-
-
24144433396
-
Evaluating 2-DNF formulas on ciphertexts
-
D. Boneh, E.-J. Goh, and K. Nissim, "Evaluating 2-DNF formulas on ciphertexts, " in Proc. 2nd Theory Cryptography Conf., 2005, pp. 325-341.
-
(2005)
Proc. 2nd Theory Cryptography Conf
, pp. 325-341
-
-
Boneh, D.1
Goh, E.-J.2
Nissim, K.3
-
27
-
-
0000845043
-
Non-interactive and information-theoretic secure verifiable secret sharing
-
T. P. Pedersen, "Non-interactive and information-theoretic secure verifiable secret sharing, " in Proc. CRYPTO, 1991, pp. 129-140.
-
(1991)
Proc. CRYPTO
, pp. 129-140
-
-
Pedersen, T.P.1
-
28
-
-
84881234170
-
Charm: A framework for rapidly prototyping cryptosystems
-
J. A. Akinyele et al., "Charm: A framework for rapidly prototyping cryptosystems, " J. Cryptograph. Eng., vol. 3, no. 2, pp. 111-128, 2013.
-
(2013)
J. Cryptograph. Eng
, vol.3
, Issue.2
, pp. 111-128
-
-
Akinyele, J.A.1
|