-
1
-
-
24944554962
-
Fuzzy Identity-Based Encryption
-
Cramer, R. (ed.), Springer, Heidelberg
-
1.Sahai, A., Waters, B.: Fuzzy Identity-Based Encryption. In: Cramer, R. (ed.)EU-ROCRYPT 2005. LNCS, vol. 3494, pp. 457–473. Springer, Heidelberg (2005)
-
(2005)
EU-ROCRYPT 2005. LNCS
, vol.3494
, pp. 457-473
-
-
Sahai, A.1
Waters, B.2
-
2
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proc. ACM Conference on Computer and Communications Security (CCS), pp. 89–98 (2006)
-
(2006)
Proc. ACM Conference on Computer and Communications Security (CCS
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
3
-
-
34548731375
-
Ciphertext-policy attribute-based encryption
-
Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: Proc. IEEE Symposium on Security and Privacy, pp. 321–334 (2007)
-
(2007)
Proc. IEEE Symposium on Security and Privacy
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
4
-
-
45749094622
-
Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures
-
Bellovin, S.M., Gennaro, R., Keromytis, A.D., Yung, M. (eds.), Springer, Heidelberg
-
4.Nishide, T., Yoneyama, K., Ohta, K.: Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures. In: Bellovin, S.M., Gennaro, R., Keromytis, A.D., Yung, M. (eds.)ACNS 2008. LNCS, vol. 5037, pp. 111–129. Springer, Heidelberg (2008)
-
(2008)
ACNS 2008. LNCS
, vol.5037
, pp. 111-129
-
-
Nishide, T.1
Yoneyama, K.2
Ohta, K.3
-
5
-
-
24944566040
-
Efficient Identity-Based Encryption Without Random Oracles
-
Cramer, R. (ed.), Springer, Heidelberg
-
5.Waters, B.: Efficient Identity-Based Encryption Without Random Oracles. In: Cramer, R. (ed.)EUROCRYPT 2005. LNCS, vol. 3494, pp. 114–127. Springer, Heidelberg (2005)
-
(2005)
EUROCRYPT 2005. LNCS
, vol.3494
, pp. 114-127
-
-
Waters, B.1
-
6
-
-
70350635850
-
A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length
-
Bao, F., Li, H., Wang, G. (eds.), Springer, Heidelberg
-
6.Emura, K., Miyaji, A., Nomura, A., Omote, K., Soshi, M.: A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length. In: Bao, F., Li, H., Wang, G. (eds.)ISPEC 2009. LNCS, vol. 5451, pp. 13–23. Springer, Heidelberg (2009)
-
(2009)
ISPEC 2009. LNCS
, vol.5451
, pp. 13-23
-
-
Emura, K.1
Miyaji, A.2
Nomura, A.3
Omote, K.4
Soshi, M.5
-
8
-
-
79956295416
-
Fully Secure Cipertext-Policy Hiding CP-ABE
-
Bao, F., Weng, J. (eds.), Springer, Heidelberg
-
8.Lai, J., Deng, R.H., Li, Y.: Fully Secure Cipertext-Policy Hiding CP-ABE. In: Bao, F., Weng, J. (eds.)ISPEC 2011. LNCS, vol. 6672, pp. 24–39. Springer, Heidelberg (2011)
-
(2011)
ISPEC 2011. LNCS
, vol.6672
, pp. 24-39
-
-
Lai, J.1
Deng, R.H.2
Li, Y.3
-
9
-
-
38049045519
-
Conjunctive, Subset, and Range Queries on Encrypted Data
-
Vadhan, S.P. (ed.), Springer, Heidelberg
-
9.Boneh, D., Waters, B.: Conjunctive, Subset, and Range Queries on Encrypted Data. In: Vadhan, S.P. (ed.)TCC 2007. LNCS, vol. 4392, pp. 535–554. Springer, Heidelberg (2007)
-
(2007)
TCC 2007. LNCS
, vol.4392
, pp. 535-554
-
-
Boneh, D.1
Waters, B.2
-
10
-
-
24144433396
-
Evaluating 2-DNF Formulas on Ciphertexts
-
Kilian, J. (ed.), Springer, Heidelberg
-
10.Boneh, D., Goh, E.-J., Nissim, K.: Evaluating 2-DNF Formulas on Ciphertexts. In: Kilian, J. (ed.)TCC 2005. LNCS, vol. 3378, pp. 325–341. Springer, Heidelberg (2005)
-
(2005)
TCC 2005. LNCS
, vol.3378
, pp. 325-341
-
-
Boneh, D.1
Goh, E.-J.2
Nissim, K.3
-
11
-
-
34548769073
-
Attribute-based publishing with hidden credentials and hidden policies
-
Kapadia, A., Tsang, P.P., Smith, S.W.: Attribute-based publishing with hidden credentials and hidden policies. In: Proc. Network and Distributed System Security Symposium (NDSS), pp. 179–192 (2007)
-
(2007)
Proc. Network and Distributed System Security Symposium (NDSS
, pp. 179-192
-
-
Kapadia, A.1
Tsang, P.P.2
Smith, S.W.3
-
12
-
-
49049111604
-
Bounded Ciphertext Policy Attribute Based Encryption
-
Aceto, L., Damgård, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.), Springer, Heidelberg
-
12.Goyal, V., Jain, A., Pandey, O., Sahai, A.: Bounded Ciphertext Policy Attribute Based Encryption. In: Aceto, L., Damgård, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.)ICALP 2008, Part II. LNCS, vol. 5126, pp. 579–591. Springer, Heidelberg (2008)
-
(2008)
ICALP 2008, Part II. LNCS
, vol.5126
, pp. 579-591
-
-
Goyal, V.1
Jain, A.2
Pandey, O.3
Sahai, A.4
-
13
-
-
79952523217
-
Constant Size Ciphertexts in Threshold Attribute-Based Encryption
-
Nguyen, P.Q., Pointcheval, D. (eds.), Springer, Heidelberg
-
13.Herranz, J., Laguillaumie, F., Ràfols, C.: Constant Size Ciphertexts in Threshold Attribute-Based Encryption. In: Nguyen, P.Q., Pointcheval, D. (eds.)PKC 2010. LNCS, vol. 6056, pp. 19–34. Springer, Heidelberg (2010)
-
(2010)
PKC 2010. LNCS
, vol.6056
, pp. 19-34
-
-
Herranz, J.1
Laguillaumie, F.2
Ràfols, C.3
-
15
-
-
58049192731
-
Attribute-based content distribution with hidden policy
-
Yu, S., Ren, K., Lou, W.: Attribute-based content distribution with hidden policy. In: Proc. Workshop on Secure Network Protocols (NPSEC), pp. 39–44 (2008)
-
(2008)
Proc. Workshop on Secure Network Protocols (NPSEC
, pp. 39-44
-
-
Yu, S.1
Ren, K.2
Lou, W.3
-
16
-
-
79952521560
-
Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization
-
Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.), Springer, Heidelberg
-
16.Waters, B.: Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.)PKC 2011. LNCS, vol. 6571, pp. 53–70. Springer, Heidelberg (2011)
-
(2011)
PKC 2011. LNCS
, vol.6571
, pp. 53-70
-
-
Waters, B.1
-
17
-
-
70350345210
-
Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
-
Halevi, S. (ed.), Springer, Heidelberg
-
17.Waters, B.: Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions. In: Halevi, S. (ed.)CRYPTO 2009. LNCS, vol. 5677, pp. 619–636. Springer, Heidelberg (2009)
-
(2009)
CRYPTO 2009. LNCS
, vol.5677
, pp. 619-636
-
-
Waters, B.1
-
18
-
-
84874324906
-
Identity-Based Encryption from the Weil Pairing
-
Kilian, J. (ed.), Springer, Heidelberg
-
18.Boneh, D., Franklin, M.: Identity-Based Encryption from the Weil Pairing. In: Kilian, J. (ed.)CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)
-
(2001)
CRYPTO 2001. LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
19
-
-
74049120601
-
Attribute-based encryption with non-monotonic access structures
-
Ostrovsky, R., Sahai, A., Waters, B.: Attribute-based encryption with non-monotonic access structures. In: Proc. ACM Conference on Computer and Communications Security (CCS), pp. 195–203 (2007)
-
(2007)
Proc. ACM Conference on Computer and Communications Security (CCS
, pp. 195-203
-
-
Ostrovsky, R.1
Sahai, A.2
Waters, B.3
-
20
-
-
0030086382
-
Role-based access control models
-
20.Sandhu, R.S., Coyne, E.J., Feistein, H.L., Youman, C.E.: Role-based access control models. Computer29(2), 38–47 (1996)
-
(1996)
Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feistein, H.L.3
Youman, C.E.4
-
21
-
-
44449129423
-
Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products
-
Smart, N.P. (ed.), Springer, Heidelberg
-
21.Katz, J., Sahai, A., Waters, B.: Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products. In: Smart, N.P. (ed.)EUROCRYPT 2008. LNCS, vol. 4965, pp. 146–162. Springer, Heidelberg (2008)
-
(2008)
EUROCRYPT 2008. LNCS
, vol.4965
, pp. 146-162
-
-
Katz, J.1
Sahai, A.2
Waters, B.3
-
23
-
-
70350407157
-
Privacy-Aware Attribute-Based Encryption with User Accountability
-
Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.), Springer, Heidelberg
-
23.Li, J., Ren, K., Zhu, B., Wan, Z.: Privacy-Aware Attribute-Based Encryption with User Accountability. In: Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.)ISC 2009. LNCS, vol. 5735, pp. 347–362. Springer, Heidelberg (2009)
-
(2009)
ISC 2009. LNCS
, vol.5735
, pp. 347-362
-
-
Li, J.1
Ren, K.2
Zhu, B.3
Wan, Z.4
-
24
-
-
77954635558
-
Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
-
Gilbert, H. (ed.), Springer, Heidelberg
-
24.Lewko, A., Okamoto, T., Sahai, A., Takashima, K., Waters, B.: Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption. In: Gilbert, H. (ed.)EUROCRYPT 2010. LNCS, vol. 6110, pp. 62–91. Springer, Heidelberg (2010)
-
(2010)
EUROCRYPT 2010. LNCS
, vol.6110
, pp. 62-91
-
-
Lewko, A.1
Okamoto, T.2
Sahai, A.3
Takashima, K.4
Waters, B.5
-
25
-
-
35048887476
-
Short Group Signatures
-
Franklin, M. (ed.), Springer, Heidelberg
-
25.Boneh, D., Boyen, X., Shacham, H.: Short Group Signatures. In: Franklin, M. (ed.)CRYPTO 2004. LNCS, vol. 3152, pp. 41–55. Springer, Heidelberg (2004)
-
(2004)
CRYPTO 2004. LNCS
, vol.3152
, pp. 41-55
-
-
Boneh, D.1
Boyen, X.2
Shacham, H.3
-
26
-
-
84862559733
-
Anonymous Identity-Based Encryption scheme without Random Oracles
-
(in Chinese)
-
Ren, Y., Gu, D., Wang, S., Zhang, X.: Anonymous Identity-Based Encryption scheme without Random Oracles. Journal of University of Science and Technology of China (to appear, 2012) (in Chinese)
-
(2012)
Journal of University of Science and Technology of China (To Appear
-
-
Ren, Y.1
Gu, D.2
Wang, S.3
Zhang, X.4
|