메뉴 건너뛰기




Volumn 7646 LNCS, Issue , 2012, Pages 146-156

Efficient ciphertext-policy attribute based encryption with hidden policy

Author keywords

Attribute based encryption; Ciphertext policy; Constant size ciphertext; Fully secure; Recipient anonymity

Indexed keywords

DISTRIBUTED COMPUTER SYSTEMS; SECURITY OF DATA;

EID: 85025119679     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-34883-9_12     Document Type: Conference Paper
Times cited : (43)

References (26)
  • 1
    • 24944554962 scopus 로고    scopus 로고
    • Fuzzy Identity-Based Encryption
    • Cramer, R. (ed.), Springer, Heidelberg
    • 1.Sahai, A., Waters, B.: Fuzzy Identity-Based Encryption. In: Cramer, R. (ed.)EU-ROCRYPT 2005. LNCS, vol. 3494, pp. 457–473. Springer, Heidelberg (2005)
    • (2005) EU-ROCRYPT 2005. LNCS , vol.3494 , pp. 457-473
    • Sahai, A.1    Waters, B.2
  • 4
    • 45749094622 scopus 로고    scopus 로고
    • Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures
    • Bellovin, S.M., Gennaro, R., Keromytis, A.D., Yung, M. (eds.), Springer, Heidelberg
    • 4.Nishide, T., Yoneyama, K., Ohta, K.: Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures. In: Bellovin, S.M., Gennaro, R., Keromytis, A.D., Yung, M. (eds.)ACNS 2008. LNCS, vol. 5037, pp. 111–129. Springer, Heidelberg (2008)
    • (2008) ACNS 2008. LNCS , vol.5037 , pp. 111-129
    • Nishide, T.1    Yoneyama, K.2    Ohta, K.3
  • 5
    • 24944566040 scopus 로고    scopus 로고
    • Efficient Identity-Based Encryption Without Random Oracles
    • Cramer, R. (ed.), Springer, Heidelberg
    • 5.Waters, B.: Efficient Identity-Based Encryption Without Random Oracles. In: Cramer, R. (ed.)EUROCRYPT 2005. LNCS, vol. 3494, pp. 114–127. Springer, Heidelberg (2005)
    • (2005) EUROCRYPT 2005. LNCS , vol.3494 , pp. 114-127
    • Waters, B.1
  • 6
    • 70350635850 scopus 로고    scopus 로고
    • A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length
    • Bao, F., Li, H., Wang, G. (eds.), Springer, Heidelberg
    • 6.Emura, K., Miyaji, A., Nomura, A., Omote, K., Soshi, M.: A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length. In: Bao, F., Li, H., Wang, G. (eds.)ISPEC 2009. LNCS, vol. 5451, pp. 13–23. Springer, Heidelberg (2009)
    • (2009) ISPEC 2009. LNCS , vol.5451 , pp. 13-23
    • Emura, K.1    Miyaji, A.2    Nomura, A.3    Omote, K.4    Soshi, M.5
  • 8
    • 79956295416 scopus 로고    scopus 로고
    • Fully Secure Cipertext-Policy Hiding CP-ABE
    • Bao, F., Weng, J. (eds.), Springer, Heidelberg
    • 8.Lai, J., Deng, R.H., Li, Y.: Fully Secure Cipertext-Policy Hiding CP-ABE. In: Bao, F., Weng, J. (eds.)ISPEC 2011. LNCS, vol. 6672, pp. 24–39. Springer, Heidelberg (2011)
    • (2011) ISPEC 2011. LNCS , vol.6672 , pp. 24-39
    • Lai, J.1    Deng, R.H.2    Li, Y.3
  • 9
    • 38049045519 scopus 로고    scopus 로고
    • Conjunctive, Subset, and Range Queries on Encrypted Data
    • Vadhan, S.P. (ed.), Springer, Heidelberg
    • 9.Boneh, D., Waters, B.: Conjunctive, Subset, and Range Queries on Encrypted Data. In: Vadhan, S.P. (ed.)TCC 2007. LNCS, vol. 4392, pp. 535–554. Springer, Heidelberg (2007)
    • (2007) TCC 2007. LNCS , vol.4392 , pp. 535-554
    • Boneh, D.1    Waters, B.2
  • 10
    • 24144433396 scopus 로고    scopus 로고
    • Evaluating 2-DNF Formulas on Ciphertexts
    • Kilian, J. (ed.), Springer, Heidelberg
    • 10.Boneh, D., Goh, E.-J., Nissim, K.: Evaluating 2-DNF Formulas on Ciphertexts. In: Kilian, J. (ed.)TCC 2005. LNCS, vol. 3378, pp. 325–341. Springer, Heidelberg (2005)
    • (2005) TCC 2005. LNCS , vol.3378 , pp. 325-341
    • Boneh, D.1    Goh, E.-J.2    Nissim, K.3
  • 12
    • 49049111604 scopus 로고    scopus 로고
    • Bounded Ciphertext Policy Attribute Based Encryption
    • Aceto, L., Damgård, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.), Springer, Heidelberg
    • 12.Goyal, V., Jain, A., Pandey, O., Sahai, A.: Bounded Ciphertext Policy Attribute Based Encryption. In: Aceto, L., Damgård, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.)ICALP 2008, Part II. LNCS, vol. 5126, pp. 579–591. Springer, Heidelberg (2008)
    • (2008) ICALP 2008, Part II. LNCS , vol.5126 , pp. 579-591
    • Goyal, V.1    Jain, A.2    Pandey, O.3    Sahai, A.4
  • 13
    • 79952523217 scopus 로고    scopus 로고
    • Constant Size Ciphertexts in Threshold Attribute-Based Encryption
    • Nguyen, P.Q., Pointcheval, D. (eds.), Springer, Heidelberg
    • 13.Herranz, J., Laguillaumie, F., Ràfols, C.: Constant Size Ciphertexts in Threshold Attribute-Based Encryption. In: Nguyen, P.Q., Pointcheval, D. (eds.)PKC 2010. LNCS, vol. 6056, pp. 19–34. Springer, Heidelberg (2010)
    • (2010) PKC 2010. LNCS , vol.6056 , pp. 19-34
    • Herranz, J.1    Laguillaumie, F.2    Ràfols, C.3
  • 16
    • 79952521560 scopus 로고    scopus 로고
    • Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization
    • Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.), Springer, Heidelberg
    • 16.Waters, B.: Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.)PKC 2011. LNCS, vol. 6571, pp. 53–70. Springer, Heidelberg (2011)
    • (2011) PKC 2011. LNCS , vol.6571 , pp. 53-70
    • Waters, B.1
  • 17
    • 70350345210 scopus 로고    scopus 로고
    • Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
    • Halevi, S. (ed.), Springer, Heidelberg
    • 17.Waters, B.: Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions. In: Halevi, S. (ed.)CRYPTO 2009. LNCS, vol. 5677, pp. 619–636. Springer, Heidelberg (2009)
    • (2009) CRYPTO 2009. LNCS , vol.5677 , pp. 619-636
    • Waters, B.1
  • 18
    • 84874324906 scopus 로고    scopus 로고
    • Identity-Based Encryption from the Weil Pairing
    • Kilian, J. (ed.), Springer, Heidelberg
    • 18.Boneh, D., Franklin, M.: Identity-Based Encryption from the Weil Pairing. In: Kilian, J. (ed.)CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)
    • (2001) CRYPTO 2001. LNCS , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 21
    • 44449129423 scopus 로고    scopus 로고
    • Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products
    • Smart, N.P. (ed.), Springer, Heidelberg
    • 21.Katz, J., Sahai, A., Waters, B.: Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products. In: Smart, N.P. (ed.)EUROCRYPT 2008. LNCS, vol. 4965, pp. 146–162. Springer, Heidelberg (2008)
    • (2008) EUROCRYPT 2008. LNCS , vol.4965 , pp. 146-162
    • Katz, J.1    Sahai, A.2    Waters, B.3
  • 23
    • 70350407157 scopus 로고    scopus 로고
    • Privacy-Aware Attribute-Based Encryption with User Accountability
    • Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.), Springer, Heidelberg
    • 23.Li, J., Ren, K., Zhu, B., Wan, Z.: Privacy-Aware Attribute-Based Encryption with User Accountability. In: Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.)ISC 2009. LNCS, vol. 5735, pp. 347–362. Springer, Heidelberg (2009)
    • (2009) ISC 2009. LNCS , vol.5735 , pp. 347-362
    • Li, J.1    Ren, K.2    Zhu, B.3    Wan, Z.4
  • 24
    • 77954635558 scopus 로고    scopus 로고
    • Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
    • Gilbert, H. (ed.), Springer, Heidelberg
    • 24.Lewko, A., Okamoto, T., Sahai, A., Takashima, K., Waters, B.: Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption. In: Gilbert, H. (ed.)EUROCRYPT 2010. LNCS, vol. 6110, pp. 62–91. Springer, Heidelberg (2010)
    • (2010) EUROCRYPT 2010. LNCS , vol.6110 , pp. 62-91
    • Lewko, A.1    Okamoto, T.2    Sahai, A.3    Takashima, K.4    Waters, B.5
  • 25
    • 35048887476 scopus 로고    scopus 로고
    • Short Group Signatures
    • Franklin, M. (ed.), Springer, Heidelberg
    • 25.Boneh, D., Boyen, X., Shacham, H.: Short Group Signatures. In: Franklin, M. (ed.)CRYPTO 2004. LNCS, vol. 3152, pp. 41–55. Springer, Heidelberg (2004)
    • (2004) CRYPTO 2004. LNCS , vol.3152 , pp. 41-55
    • Boneh, D.1    Boyen, X.2    Shacham, H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.