메뉴 건너뛰기




Volumn , Issue , 2011, Pages 523-538

Outsourcing the decryption of ABE ciphertexts

Author keywords

[No Author keywords available]

Indexed keywords

OUTSOURCING; SECURITY OF DATA;

EID: 85076484262     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (672)

References (42)
  • 1
    • 84896881434 scopus 로고    scopus 로고
    • November
    • Amazon EC2 FAQs. http://aws.amazon.com/ ec2/faqs/, November 2010.
    • (2010) Amazon EC2 FAQs
  • 4
    • 85180411878 scopus 로고    scopus 로고
    • Improved proxy re-encryption schemes with applications to secure distributed storage
    • Giuseppe Ateniese, Kevin Fu, Matthew Green, and Susan Hohenberger. Improved proxy re-encryption schemes with applications to secure distributed storage. In NDSS, pages 29-43, 2005.
    • (2005) NDSS , pp. 29-43
    • Ateniese, G.1    Fu, K.2    Green, M.3    Hohenberger, S.4
  • 8
    • 84957718934 scopus 로고    scopus 로고
    • Divertible protocols and atomic proxy cryptography
    • Matt Blaze, Gerrit Bleumer, and Martin Strauss. Divertible protocols and atomic proxy cryptography. In EUROCRYPT, pages 127-144, 1998.
    • (1998) EUROCRYPT , pp. 127-144
    • Blaze, M.1    Bleumer, G.2    Strauss, M.3
  • 9
    • 35048841300 scopus 로고    scopus 로고
    • Efficient selectiveid secure identity-based encryption without random oracles
    • Dan Boneh and Xavier Boyen. Efficient selectiveid secure identity-based encryption without random oracles. In EUROCRYPT, pages 223-238, 2004.
    • (2004) EUROCRYPT , pp. 223-238
    • Boneh, D.1    Boyen, X.2
  • 11
    • 79953230454 scopus 로고    scopus 로고
    • Functional encryption: Definitions and challenges
    • Dan Boneh, Amit Sahai, and Brent Waters. Functional encryption: Definitions and challenges. In TCC, pages 253-273, 2011.
    • (2011) TCC , pp. 253-273
    • Boneh, D.1    Sahai, A.2    Waters, B.3
  • 12
    • 38049045519 scopus 로고    scopus 로고
    • Conjunctive, subset, and range queries on encrypted data
    • Dan Boneh and Brent Waters. Conjunctive, subset, and range queries on encrypted data. In TCC, pages 535-554, 2007.
    • (2007) TCC , pp. 535-554
    • Boneh, D.1    Waters, B.2
  • 13
    • 35248875326 scopus 로고    scopus 로고
    • Relaxing chosen-ciphertext security
    • Ran Canetti, Hugo Krawczyk, and Jesper Buus Nielsen. Relaxing chosen-ciphertext security. In CRYPTO, pages 565-582, 2003.
    • (2003) CRYPTO , pp. 565-582
    • Canetti, R.1    Krawczyk, H.2    Buus Nielsen, J.3
  • 14
    • 38049078557 scopus 로고    scopus 로고
    • Multi-authority attribute based encryption
    • Melissa Chase. Multi-authority attribute based encryption. In TCC, pages 515-534, 2007.
    • (2007) TCC , pp. 515-534
    • Chase, M.1
  • 15
    • 74049163235 scopus 로고    scopus 로고
    • Improving privacy and security in multi-authority attribute-based encryption
    • Melissa Chase and Sherman S. M. Chow. Improving privacy and security in multi-authority attribute-based encryption. In ACM Conference on Computer and Communications Security, pages 121-130, 2009.
    • (2009) ACM Conference on Computer and Communications Security , pp. 121-130
    • Chase, M.1    Chow, M.S.S.2
  • 17
    • 77957002840 scopus 로고    scopus 로고
    • Improved delegation of computation using fully homomorphic encryption
    • Kai-Min Chung, Yael Kalai, and Salil P. Vadhan. Improved delegation of computation using fully homomorphic encryption. In CRYPTO, pages 483-501, 2010.
    • (2010) CRYPTO , pp. 483-501
    • Chung, K.1    Kalai, Y.2    Vadhan, S.P.3
  • 18
    • 84955339164 scopus 로고    scopus 로고
    • Secure integration of asymmetric and symmetric encryption schemes
    • Eiichiro Fujisaki and Tatsuaki Okamoto. Secure integration of asymmetric and symmetric encryption schemes. In CRYPTO '99, volume 1666, pages 537-554, 1999.
    • (1999) CRYPTO '99 , vol.1666 , pp. 537-554
    • Fujisaki, E.1    Okamoto, T.2
  • 19
    • 85032883059 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • Taher El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms. In CRYPTO, pages 10-18, 1984.
    • (1984) CRYPTO , pp. 10-18
    • El Gamal, T.1
  • 20
    • 77957005936 scopus 로고    scopus 로고
    • Non-interactive verifiable computing: Outsourcing computation to untrusted workers
    • Rosario Gennaro, Craig Gentry, and Bryan Parno. Non-interactive verifiable computing: Outsourcing computation to untrusted workers. In CRYPTO, pages 465-482, 2010.
    • (2010) CRYPTO , pp. 465-482
    • Gennaro, R.1    Gentry, C.2    Parno, B.3
  • 21
    • 70350642087 scopus 로고    scopus 로고
    • Fully homomorphic encryption using ideal lattices
    • Craig Gentry. Fully homomorphic encryption using ideal lattices. In STOC, pages 169-178, 2009.
    • (2009) STOC , pp. 169-178
    • Gentry, C.1
  • 22
    • 79957974657 scopus 로고    scopus 로고
    • Implementing Gentry's fully-homomorphic encryption scheme
    • Craig Gentry and Shai Halevi. Implementing Gentry's fully-homomorphic encryption scheme. In EUROCRYPT, pages 129-148, 2011.
    • (2011) EUROCRYPT , pp. 129-148
    • Gentry, C.1    Halevi, S.2
  • 23
    • 49049111604 scopus 로고    scopus 로고
    • Bounded ciphertext policy attributebased encryption
    • Vipul Goyal, Abishek Jain, Omkant Pandey, and Amit Sahai. Bounded ciphertext policy attributebased encryption. In ICALP, pages 579-591, 2008.
    • (2008) ICALP , pp. 579-591
    • Goyal, V.1    Jain, A.2    Pandey, O.3    Sahai, A.4
  • 27
    • 44449129423 scopus 로고    scopus 로고
    • Predicate encryption supporting disjunctions, polynomial equations, and inner products
    • Jonathan Katz, Amit Sahai, and Brent Waters. Predicate encryption supporting disjunctions, polynomial equations, and inner products. In EUROCRYPT, pages 146-162, 2008.
    • (2008) EUROCRYPT , pp. 146-162
    • Katz, J.1    Sahai, A.2    Waters, B.3
  • 28
    • 77954635558 scopus 로고    scopus 로고
    • Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption
    • Allison Lewko, Tatsuaki Okamoto, Amit Sahai, Katsuyuki Takashima, and Brent Waters. Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption. In EUROCRYPT, pages 62-91, 2010.
    • (2010) EUROCRYPT , pp. 62-91
    • Lewko, A.1    Okamoto, T.2    Sahai, A.3    Takashima, K.4    Waters, B.5
  • 29
    • 79953164949 scopus 로고    scopus 로고
    • Achieving leakage resilience through dual system encryption
    • Allison Lewko, Yannis Rouselakis, and Brent Waters. Achieving leakage resilience through dual system encryption. In TCC, pages 70-88, 2011.
    • (2011) TCC , pp. 70-88
    • Lewko, A.1    Rouselakis, Y.2    Waters, B.3
  • 34
    • 23744467453 scopus 로고    scopus 로고
    • Relationships between selected software measures and latent bug-density: Guidelines for improving quality
    • Subhas C. Misra and Virendra C. Bhavsar. Relationships between selected software measures and latent bug-density: Guidelines for improving quality. In ICCSA'03, pages 724-732, 2003.
    • (2003) ICCSA'03 , pp. 724-732
    • Misra, S.C.1    Bhavsar, V.C.2
  • 35
    • 77957011503 scopus 로고    scopus 로고
    • Fully secure functional encryption with general relations from the decisional linear assumption
    • Tatsuaki Okamoto and Katsuyuki Takashima. Fully secure functional encryption with general relations from the decisional linear assumption. In CRYPTO, pages 191-208, 2010.
    • (2010) CRYPTO , pp. 191-208
    • Okamoto, T.1    Takashima, K.2
  • 38
    • 24944554962 scopus 로고    scopus 로고
    • Fuzzy identitybased encryption
    • Amit Sahai and Brent Waters. Fuzzy identitybased encryption. In EUROCRYPT, pages 457-473, 2005.
    • (2005) EUROCRYPT , pp. 457-473
    • Sahai, A.1    Waters, B.2
  • 40
    • 85076479278 scopus 로고    scopus 로고
    • OpenSSL: The open source toolkit for SSL/TLS, April 2010
    • The OpenSSL Project v1.0. OpenSSL: The open source toolkit for SSL/TLS. www.openssl.org, April 2010.
    • The OpenSSL Project v1.0
  • 41
    • 70350345210 scopus 로고    scopus 로고
    • Dual system encryption: Realizing fully secure IBE and HIBE under simple assumptions
    • Brent Waters. Dual system encryption: Realizing fully secure IBE and HIBE under simple assumptions. In CRYPTO, pages 619-636, 2009.
    • (2009) CRYPTO , pp. 619-636
    • Waters, B.1
  • 42
    • 79952521560 scopus 로고    scopus 로고
    • Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization
    • BrentWaters. Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization. In PKC, pages 53-70, 2011.
    • (2011) PKC , pp. 53-70
    • Waters, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.