-
1
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
V. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attribute-based encryption for fine-grained access control of encrypted data, " in Proc. 13th ACM Conf. Comput. Commun. Security, 2006, pp. 89-98.
-
(2006)
Proc. 13th ACM Conf. Comput. Commun. Security
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
2
-
-
34548731375
-
Ciphertext-policy attribute-based encryption
-
J. Bethencourt, A. Sahai, and B. Waters, "Ciphertext-policy attribute-based encryption, " in Proc. IEEE Symp. Security Privacy, 2007, pp. 321-334.
-
(2007)
Proc IEEE Symp. Security Privacy
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
3
-
-
79952521560
-
Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization
-
B. Waters, "Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization, " in Proc. 14th Int. Conf. Prac. Theory Public Key Cryptography Conf. Public Key Cryptography, 2011, pp. 53-70.
-
(2011)
Proc. 14th Int. Conf. Prac. Theory Public Key Cryptography Conf. Public Key Cryptography
, pp. 53-70
-
-
Waters, B.1
-
4
-
-
77954635558
-
Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption
-
A. B. Lewko, T. Okamoto, A. Sahai, K. Takashima, and B. Waters, "Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption, " in Proc. 29th Annu. Int. Conf. Theory Appl. Cryptographic Techn., 2010, pp. 62-91.
-
(2010)
Proc. 29th Annu. Int. Conf. Theory Appl. Cryptographic Techn
, pp. 62-91
-
-
Lewko, A.B.1
Okamoto, T.2
Sahai, A.3
Takashima, K.4
Waters, B.5
-
6
-
-
77953310709
-
Achieving secure, scalable, and fine-grained data access control in cloud computing
-
S. Yu, C. Wang, K. Ren, and W. Lou, "Achieving secure, scalable, and fine-grained data access control in cloud computing, " in Proc. 29th Conf. Inform. Commun., 2010, pp. 534-542.
-
(2010)
Proc. 29th Conf. Inform. Commun
, pp. 534-542
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
-
7
-
-
84877948269
-
Attribute-based fine-grained access control with efficient revocation in cloud storage systems
-
K. Yang, X. Jia, and K. Ren, "Attribute-based fine-grained access control with efficient revocation in cloud storage systems, " in Proc. 8th ACM SIGSAC Symp. Inform., Comput. Commun. Security, 2013, pp. 523-528.
-
(2013)
Proc. 8th ACM SIGSAC Symp. Inform., Comput. Commun. Security
, pp. 523-528
-
-
Yang, K.1
Jia, X.2
Ren, K.3
-
8
-
-
84886903289
-
DAC-MACS: Effective data access control for multiauthority cloud storage systems
-
Nov
-
K. Yang, X. Jia, K. Ren, B. Zhang, and R. Xie, "DAC-MACS: Effective data access control for multiauthority cloud storage systems, " IEEE Trans.Inform. Forensics Secur., vol. 8, no. 11, pp.1790-1801, Nov.2013
-
(2013)
IEEE Trans.Inform. Forensics Secur
, vol.8
, Issue.11
, pp. 1790-1801
-
-
Yang, K.1
Jia, X.2
Ren, K.3
Zhang, B.4
Xie, R.5
-
9
-
-
84903121888
-
Expressive, efficient, and revocable data access control for multi-Authority cloud storage
-
Jul
-
K. Yang and X. Jia, "Expressive, efficient, and revocable data access control for multi-Authority cloud storage, " IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 7, pp. 1735-1744, Jul. 2014.
-
(2014)
IEEE Trans. Parallel Distrib. Syst
, vol.25
, Issue.7
, pp. 1735-1744
-
-
Yang, K.1
Jia, X.2
-
10
-
-
84865465739
-
Dynamic credentials and ciphertext delegation for attribute-based encryption
-
A. Sahai, H. Seyalioglu, and B. Waters, "Dynamic credentials and ciphertext delegation for attribute-based encryption, " in Proc. Int. Cryptol. Conf., 2012, pp. 199-217.
-
(2012)
Proc. Int. Cryptol. Conf
, pp. 199-217
-
-
Sahai, A.1
Seyalioglu, H.2
Waters, B.3
-
11
-
-
0001917195
-
Generalized secret sharing and monotone functions
-
J. C. Benaloh and J. Leichter, "Generalized secret sharing and monotone functions, " in Proc. Adv. Cryptol., 1988, pp. 27-35.
-
(1988)
Proc. Adv. Cryptol
, pp. 27-35
-
-
Benaloh, J.C.1
Leichter, J.2
-
13
-
-
24944562007
-
Hierarchical identity based encryption with constant size ciphertext
-
D. Boneh, X. Boyen, and E.-J. Goh, "Hierarchical identity based encryption with constant size ciphertext, " in Proc. 24th Annu. Int. Conf. Theory Appl. Cryptographic Techn., 2005, pp. 440-456.
-
(2005)
Proc. 24th Annu. Int. Conf. Theory Appl. Cryptographic Techn
, pp. 440-456
-
-
Boneh, D.1
Boyen, X.2
Goh, E.-J.3
-
14
-
-
0027726717
-
Random oracles are practical: A paradigm for designing efficient protocols
-
M. Bellare and P. Rogaway, "Random oracles are practical: A paradigm for designing efficient protocols, " in Proc. 1st ACM Conf. Comput. Commun. Security, 1993, pp. 62-73.
-
(1993)
Proc. 1st ACM Conf. Comput. Commun. Security
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
15
-
-
84866926275
-
Attributed-based access control for multiauthority systems in cloud storage
-
K. Yang and X. Jia, "Attributed-based access control for multiauthority systems in cloud storage, " in Proc. IEEE 32nd Int. Conf. Distrib. Comput. Syst., 2012, pp. 1-10.
-
(2012)
Proc IEEE 32nd Int. Conf. Distrib. Comput. Syst
, pp. 1-10
-
-
Yang, K.1
Jia, X.2
-
16
-
-
84883112893
-
Privacy preserving cloud data access with multi-Authorities
-
T. Jung, X.-Y. Li, Z. Wan, and M. Wan, "Privacy preserving cloud data access with multi-Authorities, " in Proc. Conf. Inform. Commun., 2013, pp. 2625-2633.
-
(2013)
Proc. Conf. Inform. Commun
, pp. 2625-2633
-
-
Jung, T.1
Li, X.-Y.2
Wan, Z.3
Wan, M.4
|