-
1
-
-
58349118819
-
-
Compact proofs of retrievability, in: Proc. ASIACRYPT 2008, 2008, pp. 90–107
-
[1] H. Shacham, B. Waters, Compact proofs of retrievability, in: Proc. ASIACRYPT 2008, 2008, pp. 90–107.
-
-
-
Shacham, H.1
Waters, B.2
-
2
-
-
79960900327
-
A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability
-
[2] Hao, Z., Zhong, S., Yu, N., A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability. IEEE Trans. Knowl. Data Eng. 23:9 (2011), 1432–1437.
-
(2011)
IEEE Trans. Knowl. Data Eng.
, vol.23
, Issue.9
, pp. 1432-1437
-
-
Hao, Z.1
Zhong, S.2
Yu, N.3
-
3
-
-
77954635558
-
-
in: Proc. EUROCRYPT 2010, 2010, pp. 62–91
-
[3] A. Lewko, T. Okamoto, A. Sahai, K. Takashima, B. Waters, Fully secure functional encryption: Attribute-based encryption and (Hierarchical) inner product encryption, in: Proc. EUROCRYPT 2010, 2010, pp. 62–91.
-
Fully secure functional encryption: Attribute-based encryption and (Hierarchical) inner product encryption
-
-
Lewko, A.1
Okamoto, T.2
Sahai, A.3
Takashima, K.4
Waters, B.5
-
5
-
-
44449129423
-
-
in: Proc. EUROCRYPT 2008, 2008, pp. 146–162
-
[5] J. Katz, A. Sahai, B. Waters, Predicate encryption supporting disjunctions, polynomial equations, and inner products, in: Proc. EUROCRYPT 2008, 2008, pp. 146–162.
-
Predicate encryption supporting disjunctions, polynomial equations, and inner products
-
-
Katz, J.1
Sahai, A.2
Waters, B.3
-
7
-
-
70350649061
-
-
in: Proc. TCC 2009, 2009, pp. 457–473
-
[7] E. Shen, E. Shi, B. Waters, Predicate privacy in encryption systems, in: Proc. TCC 2009, 2009, pp. 457–473.
-
Predicate privacy in encryption systems
-
-
Shen, E.1
Shi, E.2
Waters, B.3
-
8
-
-
84890098432
-
-
in: 5th International Conference on Intelligent Networking and Collaborative Systems, INCoS, 2013, pp. 438–442
-
[8] M. Zhang, X.A. Wang, X. Yang, W. Cai, Efficient predicate encryption supporting construction of fine-grained searchable encryption, in: 5th International Conference on Intelligent Networking and Collaborative Systems, INCoS, 2013, pp. 438–442.
-
Efficient predicate encryption supporting construction of fine-grained searchable encryption
-
-
Zhang, M.1
Wang, X.A.2
Yang, X.3
Cai, W.4
-
9
-
-
34547273527
-
-
in: Proc. ACM CCS 2006, 2006, pp. 89–98
-
[9] V. Goyal, O. Pandey, A. Sahai, B. Waters, Attribute-based encryption for fine-grained access control of encrypted data, in: Proc. ACM CCS 2006, 2006, pp. 89–98.
-
Attribute-based encryption for fine-grained access control of encrypted data
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
10
-
-
34548731375
-
-
Proc. IEEE SP 2007, 2007, pp. 321–334
-
[10] J. Bethencourt, A. Sahai, B. Waters, Ciphertext-policy attribute-based encryption, in: Proc. IEEE SP 2007, 2007, pp. 321–334.
-
Ciphertext-policy attribute-based encryption
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
11
-
-
84867290573
-
Privacy-preserving decentralized key-policy attribute-based encryption
-
[11] Han, J., Susilo, W., Mu, Y., Yan, J., Privacy-preserving decentralized key-policy attribute-based encryption. IEEE Trans. Parallel Distrib. Syst. 23:11 (2012), 2150–2162.
-
(2012)
IEEE Trans. Parallel Distrib. Syst.
, vol.23
, Issue.11
, pp. 2150-2162
-
-
Han, J.1
Susilo, W.2
Mu, Y.3
Yan, J.4
-
12
-
-
33745218758
-
Improved proxy re-encryption schemes with applications to secure distributed storage
-
[12] Ateniese, G., Fu, K., Green, M., Hohenberger, S., Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 9:1 (2006), 1–30.
-
(2006)
ACM Trans. Inf. Syst. Secur.
, vol.9
, Issue.1
, pp. 1-30
-
-
Ateniese, G.1
Fu, K.2
Green, M.3
Hohenberger, S.4
-
13
-
-
79951935674
-
Unidirectional chosen-ciphertext secure proxy re-encryption
-
[13] Libert, B., Vergnaud, D., Unidirectional chosen-ciphertext secure proxy re-encryption. IEEE Trans. Inform. Theory 57:3 (2011), 1786–1802.
-
(2011)
IEEE Trans. Inform. Theory
, vol.57
, Issue.3
, pp. 1786-1802
-
-
Libert, B.1
Vergnaud, D.2
-
15
-
-
77957005936
-
-
Proc. CRYPTO 2010, 2010, pp. 465–482
-
[15] R. Gennaro, C. Gentry, B. Parno, Non-interactive verifiable computing: Outsourcing computation to untrusted workers, in: Proc. CRYPTO 2010, 2010, pp. 465–482.
-
Non-interactive verifiable computing: Outsourcing computation to untrusted workers
-
-
Gennaro, R.1
Gentry, C.2
Parno, B.3
-
16
-
-
70349237760
-
-
in: Proc. ACM StorageSS 2009, 2008, pp. 1–10
-
[16] M.W. Storer, K. Greenan, D.D.E. Long, E.L. Miller, Secure data deduplication, in: Proc. ACM StorageSS 2009, 2008, pp. 1–10.
-
Secure data deduplication
-
-
Storer, M.W.1
Greenan, K.2
Long, D.D.E.3
Miller, E.L.4
-
17
-
-
78650053109
-
Side channels in cloud services: Deduplication in cloud storage
-
[17] Harnik, D., Pinkas, B., Shulman-Peleg, A., Side channels in cloud services: Deduplication in cloud storage. IEEE Secur. Priv. 8:6 (2010), 40–47.
-
(2010)
IEEE Secur. Priv.
, vol.8
, Issue.6
, pp. 40-47
-
-
Harnik, D.1
Pinkas, B.2
Shulman-Peleg, A.3
-
18
-
-
0037623983
-
Identity-based encryption from the weil pairing
-
[18] Boneh, D., Franklin, M., Identity-based encryption from the weil pairing. SIAM J. Comput. 32:3 (2003), 586–615.
-
(2003)
SIAM J. Comput.
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
19
-
-
38049045519
-
-
in: Proc. TCC 2007, 2007, pp. 535–554
-
[19] D. Boneh, B. Waters, Conjunctive, subset, and range queries on encrypted data, in: Proc. TCC 2007, 2007, pp. 535–554.
-
Conjunctive, subset, and range queries on encrypted data
-
-
Boneh, D.1
Waters, B.2
-
21
-
-
71549159428
-
-
Proc. CANS 2009, 2009, pp. 259–277
-
[21] C. Blundo, V. Iovino, G. Persiano, Private-key hidden vector encryption with key confidentiality, in: Proc. CANS 2009, 2009, pp. 259–277.
-
Private-key hidden vector encryption with key confidentiality
-
-
Blundo, C.1
Iovino, V.2
Persiano, G.3
-
22
-
-
80051794695
-
Efficient hidden vector encryption for conjunctive queries on encrypted data
-
[22] Park, J.H., Efficient hidden vector encryption for conjunctive queries on encrypted data. IEEE Trans. Knowl. Data Eng. 23:10 (2011), 1483–1497.
-
(2011)
IEEE Trans. Knowl. Data Eng.
, vol.23
, Issue.10
, pp. 1483-1497
-
-
Park, J.H.1
-
23
-
-
84906514653
-
Efficient hidden vector encryption with constant-size ciphertext
-
Springer International Publishing
-
[23] Phuong, T.V.X., Yang, G., Susilo, W., Efficient hidden vector encryption with constant-size ciphertext. Computer Security—ESORICS 2014, 2014, Springer International Publishing, 472–487.
-
(2014)
Computer Security—ESORICS 2014
, pp. 472-487
-
-
Phuong, T.V.X.1
Yang, G.2
Susilo, W.3
-
25
-
-
79952189632
-
Inner-product encryption under standard assumptions
-
[25] Park, J.H., Inner-product encryption under standard assumptions. Des. Codes Cryptogr. 58:3 (2011), 235–257.
-
(2011)
Des. Codes Cryptogr.
, vol.58
, Issue.3
, pp. 235-257
-
-
Park, J.H.1
-
30
-
-
35048901123
-
-
Proc. EUROCRYPT 2004, 2004, pp. 506–522
-
[30] D. Boneh, G.D. Crescenzo, R. Ostrovsky, G. Persiano, Public key encryption with keyword search, in: Proc. EUROCRYPT 2004, 2004, pp. 506–522.
-
Public key encryption with keyword search
-
-
Boneh, D.1
Crescenzo, G.D.2
Ostrovsky, R.3
Persiano, G.4
-
32
-
-
40049107631
-
Provably secure timed-release public key encryption
-
article 8
-
[32] Cheon, J.H., Hopper, N., Kim, Y., Osipkov, I., Provably secure timed-release public key encryption. ACM Trans. Inf. Syst. Secur., 11(2), 2008 article 8.
-
(2008)
ACM Trans. Inf. Syst. Secur.
, vol.11
, Issue.2
-
-
Cheon, J.H.1
Hopper, N.2
Kim, Y.3
Osipkov, I.4
-
33
-
-
85018107502
-
-
Proc. 18th USENIX Security Symposium, 2009, pp. 299–350
-
[33] R. Geambasu, T. Kohno, A. Levy, H.M. Levy, Vanish: Increasing data privacy with self-destructing data, in: Proc. 18th USENIX Security Symposium, 2009, pp. 299–350.
-
Vanish: Increasing data privacy with self-destructing data
-
-
Geambasu, R.1
Kohno, T.2
Levy, A.3
Levy, H.M.4
-
34
-
-
84860512062
-
A secure erasure code-based cloud storage system with secure data forwarding
-
[34] Lin, H.Y., Tzeng, W.G., A secure erasure code-based cloud storage system with secure data forwarding. IEEE Trans. Parallel Distrib. Syst. 23:6 (2012), 995–1003.
-
(2012)
IEEE Trans. Parallel Distrib. Syst.
, vol.23
, Issue.6
, pp. 995-1003
-
-
Lin, H.Y.1
Tzeng, W.G.2
-
36
-
-
26444525625
-
Fuzzy vault for fingerprints
-
[36] Uludag, U., Pankanti, S., Jain, A.K., Fuzzy vault for fingerprints. Audio- and Video-Based Biometric Person Authentication, 2005, 310–319.
-
(2005)
Audio- and Video-Based Biometric Person Authentication
, pp. 310-319
-
-
Uludag, U.1
Pankanti, S.2
Jain, A.K.3
|