-
1
-
-
34548731375
-
Ciphertext-policy attribute-based encryption
-
Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE S&P 2007, pp. 321-334 (2007)
-
(2007)
IEEE S&P 2007
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
2
-
-
84957718934
-
Divertible protocols and atomic proxy cryptography
-
Nyberg, K. (ed.), Springer, Heidelberg
-
Blaze, M., Bleumer, G., Strauss, M.J.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127-144. Springer, Heidelberg (1998)
-
(1998)
EUROCRYPT 1998. LNCS
, vol.1403
, pp. 127-144
-
-
Blaze, M.1
Bleumer, G.2
Strauss, M.J.3
-
3
-
-
35048852705
-
Chosen-ciphertext security from identity-based encryption
-
Cachin, C., Camenisch, J.L. (eds.), Springer, Heidelberg
-
Canetti, R., Halevi, S., Katz, J.: Chosen-ciphertext security from identity-based encryption. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 207-222. Springer, Heidelberg (2004)
-
(2004)
EUROCRYPT 2004. LNCS
, vol.3027
, pp. 207-222
-
-
Canetti, R.1
Halevi, S.2
Katz, J.3
-
4
-
-
45749116552
-
Provably secure ciphertext policy ABE
-
Cheung, L., Newport, C.: Provably secure ciphertext policy ABE. In: ACM CCS 2007, pp. 456-465 (2007)
-
(2007)
ACM CCS 2007
, pp. 456-465
-
-
Cheung, L.1
Newport, C.2
-
5
-
-
84955339164
-
Secure integration of asymmetric and symmetric encryption schemes
-
Wiener, M. (ed.), Springer, Heidelberg
-
Fujisaki, E., Okamoto, T.: Secure integration of asymmetric and symmetric encryption schemes. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 537-554. Springer, Heidelberg (1999)
-
(1999)
CRYPTO 1999. LNCS
, vol.1666
, pp. 537-554
-
-
Fujisaki, E.1
Okamoto, T.2
-
6
-
-
34547273527
-
Attribute-based encryption for fine grained access control of encrypted data
-
Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine grained access control of encrypted data. In: ACM CCS 2006, pp. 89-98 (2006)
-
(2006)
ACM CCS 2006
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
7
-
-
34547273527
-
Attribute-based encryption for finegrained access control of encrypted data
-
Juels, A.,Wright, R.N., De Capitani di Vimercati, S. (eds.), ACM
-
Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for finegrained access control of encrypted data. In: Juels, A.,Wright, R.N., De Capitani di Vimercati, S. (eds.) ACM Conference on Computer and Communications Security, pp. 89-98. ACM (2006)
-
(2006)
ACM Conference on Computer and Communications Security
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
9
-
-
84883113038
-
Energy provisioning in wireless rechargeable sensor networks
-
He, S., Chen, J., Jiang, F., Yau, D.K.Y., Xing, G., Sun, Y.: Energy provisioning in wireless rechargeable sensor networks. IEEE Trans. Mob. Comput. 12(10), 1931-1942 (2013)
-
(2013)
IEEE Trans. Mob. Comput
, vol.12
, Issue.10
, pp. 1931-1942
-
-
He, S.1
Chen, J.2
Jiang, F.3
Yau, D.K.Y.4
Xing, G.5
Sun, Y.6
-
10
-
-
84880652100
-
Attribute-based encryption with verifiable outsourced decryption
-
Lai, C.G.J., Deng, R.H., Weng, J.: Attribute-based encryption with verifiable outsourced decryption. IEEE Trans. Inf. Forensics Secur. 8(8), 1343-1354 (2013)
-
(2013)
IEEE Trans. Inf. Forensics Secur
, vol.8
, Issue.8
, pp. 1343-1354
-
-
Lai, C.G.J.1
Deng, R.H.2
Weng, J.3
-
11
-
-
77954635558
-
Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption
-
Gilbert, H. (ed.), Springer, Heidelberg
-
Lewko, A., Okamoto, T., Sahai, A., Takashima, K., Waters, B.: Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 62-91. Springer, Heidelberg (2010)
-
(2010)
EUROCRYPT 2010. LNCS
, vol.6110
, pp. 62-91
-
-
Lewko, A.1
Okamoto, T.2
Sahai, A.3
Takashima, K.4
Waters, B.5
-
12
-
-
84894634556
-
Securely outsourcing attribute-based encryption with checkability
-
Li, J., Huang, X., Li, J., Chen, X., Xiang, Y.: Securely outsourcing attribute-based encryption with checkability. IEEE Trans. Parallel Distrib. Syst. 25(8), 2201-2210 (2014)
-
(2014)
IEEE Trans. Parallel Distrib. Syst
, vol.25
, Issue.8
, pp. 2201-2210
-
-
Li, J.1
Huang, X.2
Li, J.3
Chen, X.4
Xiang, Y.5
-
13
-
-
84939231120
-
Revisiting attribute-based encryption with verifiable outsourced decryption
-
Lin, S., Zhang, R., Ma, H., Wang, M.: Revisiting attribute-based encryption with verifiable outsourced decryption. IEEE Trans. Inf. Forensics Secur. 10(10), 2119-2130 (2015)
-
(2015)
IEEE Trans. Inf. Forensics Secur
, vol.10
, Issue.10
, pp. 2119-2130
-
-
Lin, S.1
Zhang, R.2
Ma, H.3
Wang, M.4
-
14
-
-
84978311252
-
Generic and efficient constructions of attribute-based encryptionwith verifiable outsourced decryption
-
Mao, X., Lai, J., Mei, Q., Chen, K., Weng, J.: Generic and efficient constructions of attribute-based encryptionwith verifiable outsourced decryption. IEEE Trans. Dependable Secur. Comput. (99), 1 (2015)
-
(2015)
IEEE Trans. Dependable Secur. Comput
, Issue.99
, pp. 1
-
-
Mao, X.1
Lai, J.2
Mei, Q.3
Chen, K.4
Weng, J.5
-
15
-
-
74049120601
-
Attribute-based encryption with nonmonotonic access structures
-
Ostrovsky, R., Sahai, A., Waters, B.: Attribute-based encryption with nonmonotonic access structures. In: ACM CCS 2007, pp. 195-203 (2007)
-
(2007)
ACM CCS 2007
, pp. 195-203
-
-
Ostrovsky, R.1
Sahai, A.2
Waters, B.3
-
17
-
-
84930201567
-
Attribute-based encryption with efficient verifiable outsourced decryption
-
Qin, B., Deng, R.H., Liu, S., Ma, S.: Attribute-based encryption with efficient verifiable outsourced decryption. IEEE Trans. Inf. Forensics Secur. 10(7), 1384-1393 (2015)
-
(2015)
IEEE Trans. Inf. Forensics Secur
, vol.10
, Issue.7
, pp. 1384-1393
-
-
Qin, B.1
Deng, R.H.2
Liu, S.3
Ma, S.4
-
18
-
-
24944554962
-
Fuzzy identity-based encryption
-
Cramer, R. (ed.), Springer, Heidelberg
-
Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457-473. Springer, Heidelberg (2005)
-
(2005)
EUROCRYPT 2005. LNCS
, vol.3494
, pp. 457-473
-
-
Sahai, A.1
Waters, B.2
-
19
-
-
77957011503
-
Fully secure functional encryption with general relations from the decisional linear assumption
-
Rabin, T. (ed.), Springer, Heidelberg
-
Okamoto, T., Takashima, K.: Fully secure functional encryption with general relations from the decisional linear assumption. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 191-208. Springer, Heidelberg (2010)
-
(2010)
CRYPTO 2010. LNCS
, vol.6223
, pp. 191-208
-
-
Okamoto, T.1
Takashima, K.2
-
20
-
-
84871604439
-
Fully secure unbounded inner-product and attributebased encryption
-
Wang, X., Sako, K. (eds.), Springer, Heidelberg
-
Okamoto, T., Takashima, K.: Fully secure unbounded inner-product and attributebased encryption. In: Wang, X., Sako, K. (eds.) ASIACRYPT 2012. LNCS, vol. 7658, pp. 349-366. Springer, Heidelberg (2012)
-
(2012)
ASIACRYPT 2012. LNCS
, vol.7658
, pp. 349-366
-
-
Okamoto, T.1
Takashima, K.2
-
21
-
-
70350345210
-
Dual system encryption: Realizing fully secure IBE and HIBE under simple assumptions
-
Halevi, S. (ed.), Springer, Heidelberg
-
Waters, B.: Dual system encryption: realizing fully secure IBE and HIBE under simple assumptions. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 619-636. Springer, Heidelberg (2009)
-
(2009)
CRYPTO 2009. LNCS
, vol.5677
, pp. 619-636
-
-
Waters, B.1
-
22
-
-
79952521560
-
Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization
-
Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.), Springer, Heidelberg
-
Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 53-70. Springer, Heidelberg (2011)
-
(2011)
PKC 2011. LNCS
, vol.6571
, pp. 53-70
-
-
Waters, B.1
|