-
1
-
-
33745134401
-
Searchable encryption revisited: Consistency properties, relation to anonymous ibe, and extensions
-
M. Abdalla, M. Bellare, D. Catalano, E. Kiltz, T. Kohno, T. Lange, J. Malone-Lee, G. Neven, P. Paillier, and H. Shi. Searchable encryption revisited: Consistency properties, relation to anonymous ibe, and extensions. In Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings, pages 205-222, 2005.
-
(2005)
Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference Santa Barbara, California, USA, August 14-18, 2005, Proceedings
, pp. 205-222
-
-
Abdalla, M.1
Bellare, M.2
Catalano, D.3
Kiltz, E.4
Kohno, T.5
Lange, T.6
Malone-Lee, J.7
Neven, G.8
Paillier, P.9
Shi, H.10
-
2
-
-
24144432124
-
Efficient multi-receiver identity-based encryption and its application to broadcast encryption
-
J. Baek, R. Safavi-Naini, and W. Susilo. Efficient multi-receiver identity-based encryption and its application to broadcast encryption. In Public Key Cryptography - PKC 2005, 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005, Proceedings, pages 380-397, 2005.
-
(2005)
Public Key Cryptography - PKC 2005, 8th International Workshop on Theory and Practice in Public Key Cryptography, les Diablerets, Switzerland, January 23-26, 2005, Proceedings
, pp. 380-397
-
-
Baek, J.1
Safavi-Naini, R.2
Susilo, W.3
-
3
-
-
33750065702
-
Privacy in encrypted content distribution using private broadcast encryption
-
FC 2006, Anguilla, British West Indies, February 27-March 2, 2006, Revised Selected Papers
-
A. Barth, D. Boneh, and B. Waters. Privacy in encrypted content distribution using private broadcast encryption. In Financial Cryptography and Data Security, 10th International Conference, FC 2006, Anguilla, British West Indies, February 27-March 2, 2006, Revised Selected Papers, pages 52-64, 2006.
-
(2006)
Financial Cryptography and Data Security, 10th International Conference
, pp. 52-64
-
-
Barth, A.1
Boneh, D.2
Waters, B.3
-
4
-
-
84946837370
-
Key-privacy in public-key encryption
-
M. Bellare, A. Boldyreva, A. Desai, and D. Pointcheval. Key-privacy in public-key encryption. In Advances in Cryptology - ASIACRYPT 2001, 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, December 9-13, 2001, Proceedings, pages 566-582, 2001.
-
(2001)
Advances in Cryptology - ASIACRYPT 2001, 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, December 9-13, 2001, Proceedings
, pp. 566-582
-
-
Bellare, M.1
Boldyreva, A.2
Desai, A.3
Pointcheval, D.4
-
5
-
-
84957629783
-
Relations among notions of security for public-key encryption schemes
-
M. Bellare, A. Desai, D. Pointcheval, and P. Rogaway. Relations among notions of security for public-key encryption schemes. In Advances in Cryptology -CRYPTO '98, 18th Annual International Cryptology Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings, pages 26-45, 1998.
-
(1998)
Advances in Cryptology -CRYPTO ' 98 18th Annual International Cryptology Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings
, pp. 26-45
-
-
Bellare, M.1
Desai, A.2
Pointcheval, D.3
Rogaway, P.4
-
6
-
-
24944505322
-
Hierarchical identity based encryption with constant size ciphertext
-
D. Boneh, X. Boyen, and E. Goh. Hierarchical identity based encryption with constant size ciphertext. IACR Cryptology ePrint Archive, 2005:15, 2005. http://eprint.iacr.org/2005/015.
-
(2005)
IACR Cryptology EPrint Archive, 2005
, vol.15
-
-
Boneh, D.1
Boyen, X.2
Goh, E.3
-
7
-
-
33745166648
-
Collusion resistant broadcast encryption with short ciphertexts and private keys
-
D. Boneh, C. Gentry, and B. Waters. Collusion resistant broadcast encryption with short ciphertexts and private keys. In Advances in Cryptology -CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings, pages 258-275, 2005.
-
(2005)
Advances in Cryptology -CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings
, pp. 258-275
-
-
Boneh, D.1
Gentry, C.2
Waters, B.3
-
8
-
-
84905364497
-
Low overhead broadcast encryption from multilinear maps
-
D. Boneh, B. Waters, and M. Zhandry. Low overhead broadcast encryption from multilinear maps. In Advances in Cryptology - CRYPTO 2014-34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part I, pages 206-223, 2014.
-
(2014)
Advances in Cryptology - CRYPTO 2014-34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings
, pp. 206-223
-
-
Boneh, D.1
Waters, B.2
Zhandry, M.3
-
9
-
-
33749573228
-
Anonymous hierarchical identity-based encryption (without random oracles)
-
X. Boyen and B. Waters. Anonymous hierarchical identity-based encryption (without random oracles). In Advances in Cryptology - CRYPTO 2006, 26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006, Proceedings, pages 290-307, 2006.
-
(2006)
Advances in Cryptology - CRYPTO 2006, 26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006, Proceedings
, pp. 290-307
-
-
Boyen, X.1
Waters, B.2
-
10
-
-
67049154037
-
Blind and anonymous identity-based encryption and authorised private searches on public key encrypted data
-
J. Camenisch, M. Kohlweiss, A. Rial, and C. Sheedy. Blind and anonymous identity-based encryption and authorised private searches on public key encrypted data. In Public Key Cryptography - PKC 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings, pages 196-214, 2009.
-
(2009)
Public Key Cryptography - PKC 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings
, pp. 196-214
-
-
Camenisch, J.1
Kohlweiss, M.2
Rial, A.3
Sheedy, C.4
-
11
-
-
80052701910
-
Jpbc: Java pairing based cryptography
-
Kerkyra, Corfu, Greece, June 28 - July 1
-
A. De Caro and V. Iovino. jpbc: Java pairing based cryptography. In Proceedings of the 16th IEEE Symposium on Computers and Communications, ISCC 2011, pages 850-855, Kerkyra, Corfu, Greece, June 28 - July 1, 2011.
-
(2011)
Proceedings of the 16th IEEE Symposium on Computers and Communications, ISCC 2011
, pp. 850-855
-
-
De Caro, A.1
Iovino, V.2
-
12
-
-
38149117029
-
Identity-based broadcast encryption with constant size ciphertexts and private keys
-
C. Delerablée. Identity-based broadcast encryption with constant size ciphertexts and private keys. In Advances in Cryptology - ASIACRYPT 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings, pages 200-215, 2007.
-
(2007)
Advances in Cryptology - ASIACRYPT 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings
, pp. 200-215
-
-
Delerablée, C.1
-
13
-
-
38149121099
-
Fully collusion secure dynamic broadcast encryption with constant-size ciphertexts or decryption keys
-
C. Delerablée, P. Paillier, and D. Pointcheval. Fully collusion secure dynamic broadcast encryption with constant-size ciphertexts or decryption keys. In Pairing-Based Cryptography - Pairing 2007, First International Conference, Tokyo, Japan, July 2-4, 2007, Proceedings, pages 39-59, 2007.
-
(2007)
Pairing-Based Cryptography - Pairing 2007, First International Conference, Tokyo, Japan, July 2-4, 2007, Proceedings
, pp. 39-59
-
-
Delerablée, C.1
Paillier, P.2
Pointcheval, D.3
-
14
-
-
14844304181
-
Public key broadcast encryption for stateless receivers
-
ACM CCS-9 Workshop, DRM 2002, Washington, DC, USA, November 18, 2002, Revised Papers
-
Y. Dodis and N. Fazio. Public key broadcast encryption for stateless receivers. In Security and Privacy in Digital Rights Management, ACM CCS-9 Workshop, DRM 2002, Washington, DC, USA, November 18, 2002, Revised Papers, pages 61-80, 2002.
-
(2002)
Security and Privacy in Digital Rights Management
, pp. 61-80
-
-
Dodis, Y.1
Fazio, N.2
-
15
-
-
85028450627
-
Non-malleable cryptography (extended abstract)
-
May 5-8, 1991, New Orleans, Louisiana, USA
-
D. Dolev, C. Dwork, and M. Naor. Non-malleable cryptography (extended abstract). In Proceedings of the 23rd Annual ACM Symposium on Theory of Computing, May 5-8, 1991, New Orleans, Louisiana, USA, pages 542-552, 1991.
-
(1991)
Proceedings of the 23rd Annual ACM Symposium on Theory of Computing
, pp. 542-552
-
-
Dolev, D.1
Dwork, C.2
Naor, M.3
-
16
-
-
84861665813
-
Outsider-anonymous broadcast encryption with sublinear ciphertexts
-
N. Fazio and I. M. Perera. Outsider-anonymous broadcast encryption with sublinear ciphertexts. In Public Key Cryptography - PKC 2012-15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings, pages 225-242, 2012.
-
(2012)
Public Key Cryptography - PKC 2012-15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings
, pp. 225-242
-
-
Fazio, N.1
Perera, I.M.2
-
17
-
-
84979291225
-
Broadcast encryption
-
A. Fiat and M. Naor. Broadcast encryption. In Advances in Cryptology - CRYPTO '93, 13th Annual International Cryptology Conference, Santa Barbara, California, USA, August 22-26, 1993, Proceedings, pages 480-491, 1993.
-
(1993)
Advances in Cryptology - CRYPTO ' 93, 13th Annual International Cryptology Conference, Santa Barbara, California, USA, August 22-26, 1993, Proceedings
, pp. 480-491
-
-
Fiat, A.1
Naor, M.2
-
18
-
-
67650659197
-
Adaptive security in broadcast encryption systems (with short ciphertexts)
-
C. Gentry and B. Waters. Adaptive security in broadcast encryption systems (with short ciphertexts). In Advances in Cryptology - EUROCRYPT 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings, pages 171-188, 2009.
-
(2009)
Advances in Cryptology - EUROCRYPT 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings
, pp. 171-188
-
-
Gentry, C.1
Waters, B.2
-
19
-
-
84898467054
-
Key management scheme using dynamic identity-based broadcast encryption for social network services
-
Y. Jung, Y. Nam, J. Kim, W. Jeon, H. Lee, and D. Won. Key management scheme using dynamic identity-based broadcast encryption for social network services. Advances in Computer Science and its Applications, 279:435-443, 2014.
-
(2014)
Advances in Computer Science and Its Applications
, vol.279
, pp. 435-443
-
-
Jung, Y.1
Nam, Y.2
Kim, J.3
Jeon, W.4
Lee, H.5
Won, D.6
-
20
-
-
44449129423
-
Predicate encryption supporting disjunctions, polynomial equations, and inner products
-
J. Katz, A. Sahai, and B. Waters. Predicate encryption supporting disjunctions, polynomial equations, and inner products. In Advances in Cryptology - EUROCRYPT 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings, pages 146-162, 2008.
-
(2008)
Advances in Cryptology - EUROCRYPT 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings
, pp. 146-162
-
-
Katz, J.1
Sahai, A.2
Waters, B.3
-
21
-
-
84923249651
-
Adaptively secure identity-based broadcast encryption with a constant-sized ciphertext
-
J. Kim, W. Susilo, M. H. Au, and J. Seberry. Adaptively secure identity-based broadcast encryption with a constant-sized ciphertext. IEEE Transactions on Information Forensics and Security, 10(3):679-693, 2015.
-
(2015)
IEEE Transactions on Information Forensics and Security
, vol.10
, Issue.3
, pp. 679-693
-
-
Kim, J.1
Susilo, W.2
Au, M.H.3
Seberry, J.4
-
22
-
-
85025119679
-
Efficient ciphertext-policy attribute based encryption with hidden policy
-
X. Li, D. Gu, Y. Ren, N. Ding, and K. Yuan. Efficient ciphertext-policy attribute based encryption with hidden policy. In Internet and Distributed Computing Systems - 5th International Conference, IDCS 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings, pages 146-159, 2012.
-
(2012)
Internet and Distributed Computing Systems - 5th International Conference, IDCS 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings
, pp. 146-159
-
-
Li, X.1
Gu, D.2
Ren, Y.3
Ding, N.4
Yuan, K.5
-
23
-
-
84861702751
-
Anonymous broadcast encryption: Adaptive security and efficient constructions in the standard model
-
B. Libert, K. G. Paterson, and E. A. Quaglia. Anonymous broadcast encryption: Adaptive security and efficient constructions in the standard model. In Public Key Cryptography - PKC 2012-15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings, pages 206-224, 2012.
-
(2012)
Public Key Cryptography - PKC 2012-15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings
, pp. 206-224
-
-
Libert, B.1
Paterson, K.G.2
Quaglia, E.A.3
-
24
-
-
36749076982
-
GSIS: A secure and privacy-preserving protocol for vehicular communications
-
X. Lin, X. Sun, P. Ho, and X. Shen. GSIS: A secure and privacy-preserving protocol for vehicular communications. IEEE T. Vehicular Technology, 56(6):3442-3456, 2007.
-
(2007)
IEEE T. Vehicular Technology
, vol.56
, Issue.6
, pp. 3442-3456
-
-
Lin, X.1
Sun, X.2
Ho, P.3
Shen, X.4
-
25
-
-
84858234376
-
Adaptively secure broadcast encryption with short ciphertexts
-
B. Malek and A. Miri. Adaptively secure broadcast encryption with short ciphertexts. I. J. Network Security, 14(2):71-79, 2012.
-
(2012)
I. J. Network Security
, vol.14
, Issue.2
, pp. 71-79
-
-
Malek, B.1
Miri, A.2
-
26
-
-
84880852861
-
Revocation and tracing schemes for stateless receivers
-
D. Naor, M. Naor, and J. Lotspiech. Revocation and tracing schemes for stateless receivers. In Advances in Cryptology - CRYPTO 2001, 21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 19-23, 2001, Proceedings, pages 41-62, 2001.
-
(2001)
Advances in Cryptology - CRYPTO 2001, 21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 19-23, 2001, Proceedings
, pp. 41-62
-
-
Naor, D.1
Naor, M.2
Lotspiech, J.3
-
27
-
-
0024983231
-
Public-key cryptosystems provably secure against chosen ciphertext attacks
-
May 13-17, 1990 Baltimore, Maryland, USA
-
M. Naor and M. Yung. Public-key cryptosystems provably secure against chosen ciphertext attacks. In Proceedings of the 22nd Annual ACM Symposium on Theory of Computing, May 13-17, 1990, Baltimore, Maryland, USA, pages 427-437, 1990.
-
(1990)
Proceedings of the 22nd Annual ACM Symposium on Theory of Computing
, pp. 427-437
-
-
Naor, M.1
Yung, M.2
-
28
-
-
84974554584
-
Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack
-
C. Rackoff and D. R. Simon. Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack. In Advances in Cryptology -CRYPTO '91, 11th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1991, Proceedings, pages 433-444, 1991.
-
(1991)
Advances in Cryptology -CRYPTO ' 91, 11th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1991, Proceedings
, pp. 433-444
-
-
Rackoff, C.1
Simon, D.R.2
-
29
-
-
84903887855
-
Fully anonymous identity-based broadcast encryption without random oracles
-
Y. Ren, Z. Niu, and X. Zhang. Fully anonymous identity-based broadcast encryption without random oracles. I. J. Network Security, 16(4):256-264, 2014.
-
(2014)
I. J. Network Security
, vol.16
, Issue.4
, pp. 256-264
-
-
Ren, Y.1
Niu, Z.2
Zhang, X.3
-
30
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
A. Shamir. Identity-based cryptosystems and signature schemes. In Advances in Cryptology, Proceedings of CRYPTO '84, Santa Barbara, California, USA, August 19-22, 1984, Proceedings, pages 47-53, 1984.
-
(1984)
Advances in Cryptology, Proceedings of CRYPTO '84, Santa Barbara, California, USA, August 19-22, 1984, Proceedings
, pp. 47-53
-
-
Shamir, A.1
-
31
-
-
84919657590
-
Efficient anonymous identity-based broadcast encryption without random oracles
-
L. Xie and Y. Ren. Efficient anonymous identity-based broadcast encryption without random oracles. IJDCF, 6(2):40-51, 2014.
-
(2014)
IJDCF
, vol.6
, Issue.2
, pp. 40-51
-
-
Xie, L.1
Ren, Y.2
-
32
-
-
84884363871
-
Comment on wang et al.'s anonymous multi-receiver id-based encryption scheme and its improved schemes
-
J. Zhang, Y. Xu, and J. Zou. Comment on wang et al.'s anonymous multi-receiver id-based encryption scheme and its improved schemes. IJIIDS, 7(5):400-413, 2013.
-
(2013)
IJIIDS
, vol.7
, Issue.5
, pp. 400-413
-
-
Zhang, J.1
Xu, Y.2
Zou, J.3
-
33
-
-
84894159504
-
Anonymous identity-based broadcast encryption with adaptive security
-
L. Zhang, Q. Wu, and Y. Mu. Anonymous identity-based broadcast encryption with adaptive security. In Cyberspace Safety and Security - 5th International Symposium, CSS 2013, Zhangjiajie, China, November 13-15, 2013, Proceedings, pages 258-271, 2013.
-
(2013)
Cyberspace Safety and Security - 5th International Symposium, CSS 2013, Zhangjiajie, China, November 13-15, 2013, Proceedings
, pp. 258-271
-
-
Zhang, L.1
Wu, Q.2
Mu, Y.3
-
34
-
-
84880573517
-
Efficient constructions of anonymous multireceiver encryption protocol and their deployment in group e-mail systems with privacy preservation
-
M. Zhang and T. Takagi. Efficient constructions of anonymous multireceiver encryption protocol and their deployment in group e-mail systems with privacy preservation. IEEE Systems Journal, 7(3):410-419, 2013.
-
(2013)
IEEE Systems Journal
, vol.7
, Issue.3
, pp. 410-419
-
-
Zhang, M.1
Takagi, T.2
|