-
1
-
-
84896881434
-
-
November
-
Amazon EC2 FAQs. http://aws.amazon.com/ ec2/faqs/, November 2010.
-
(2010)
Amazon EC2 FAQs
-
-
-
2
-
-
33745134401
-
Searchable encryption revisited: Consistency properties, relation to anonymous ibe, and extensions
-
Michel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange, John Malone-Lee, Gregory Neven, Pascal Paillier, and Haixia Shi. Searchable encryption revisited: Consistency properties, relation to anonymous ibe, and extensions. In CRYPTO, pages 205-222, 2005.
-
(2005)
CRYPTO
, pp. 205-222
-
-
Abdalla, M.1
Bellare, M.2
Catalano, D.3
Kiltz, E.4
Kohno, T.5
Lange, T.6
Malone-Lee, J.7
Neven, G.8
Paillier, P.9
Shi, H.10
-
3
-
-
84855357673
-
-
Cryptology ePrint Archive, Report 2010/565
-
Joseph A. Akinyele, Christoph U. Lehmann, Matthew Green, MatthewW. Pagano, Zachary N. J. Peterson, and Aviel D. Rubin. Self-protecting electronic medical records using Attribute-Based Encryption. Cryptology ePrint Archive, Report 2010/565, 2010. Available from http://eprint. iacr.org/.
-
(2010)
Self-protecting Electronic Medical Records Using Attribute-Based Encryption
-
-
Akinyele, J.A.1
Lehmann, C.U.2
Green, M.3
Pagano, M.W.4
Peterson, J.Z.N.5
Rubin, A.D.6
-
4
-
-
85180411878
-
Improved proxy re-encryption schemes with applications to secure distributed storage
-
Giuseppe Ateniese, Kevin Fu, Matthew Green, and Susan Hohenberger. Improved proxy re-encryption schemes with applications to secure distributed storage. In NDSS, pages 29-43, 2005.
-
(2005)
NDSS
, pp. 29-43
-
-
Ateniese, G.1
Fu, K.2
Green, M.3
Hohenberger, S.4
-
5
-
-
0003745894
-
-
PhD thesis, Israel Institute of Technology, Technion, Haifa, Israel
-
Amos Beimel. Secure Schemes for Secret Sharing and Key Distribution. PhD thesis, Israel Institute of Technology, Technion, Haifa, Israel, 1996.
-
(1996)
Secure Schemes for Secret Sharing and Key Distribution
-
-
Beimel, A.1
-
8
-
-
84957718934
-
Divertible protocols and atomic proxy cryptography
-
Matt Blaze, Gerrit Bleumer, and Martin Strauss. Divertible protocols and atomic proxy cryptography. In EUROCRYPT, pages 127-144, 1998.
-
(1998)
EUROCRYPT
, pp. 127-144
-
-
Blaze, M.1
Bleumer, G.2
Strauss, M.3
-
9
-
-
35048841300
-
Efficient selectiveid secure identity-based encryption without random oracles
-
Dan Boneh and Xavier Boyen. Efficient selectiveid secure identity-based encryption without random oracles. In EUROCRYPT, pages 223-238, 2004.
-
(2004)
EUROCRYPT
, pp. 223-238
-
-
Boneh, D.1
Boyen, X.2
-
10
-
-
35048901123
-
Public key encryption with keyword search
-
Dan Boneh, Giovanni Di Crescenzo, Rafail Ostrovsky, and Giuseppe Persiano. Public key encryption with keyword search. In EUROCRYPT, pages 506-522, 2004.
-
(2004)
EUROCRYPT
, pp. 506-522
-
-
Boneh, D.1
Di Crescenzo, G.2
Ostrovsky, R.3
Persiano, G.4
-
11
-
-
79953230454
-
Functional encryption: Definitions and challenges
-
Dan Boneh, Amit Sahai, and Brent Waters. Functional encryption: Definitions and challenges. In TCC, pages 253-273, 2011.
-
(2011)
TCC
, pp. 253-273
-
-
Boneh, D.1
Sahai, A.2
Waters, B.3
-
12
-
-
38049045519
-
Conjunctive, subset, and range queries on encrypted data
-
Dan Boneh and Brent Waters. Conjunctive, subset, and range queries on encrypted data. In TCC, pages 535-554, 2007.
-
(2007)
TCC
, pp. 535-554
-
-
Boneh, D.1
Waters, B.2
-
13
-
-
35248875326
-
Relaxing chosen-ciphertext security
-
Ran Canetti, Hugo Krawczyk, and Jesper Buus Nielsen. Relaxing chosen-ciphertext security. In CRYPTO, pages 565-582, 2003.
-
(2003)
CRYPTO
, pp. 565-582
-
-
Canetti, R.1
Krawczyk, H.2
Buus Nielsen, J.3
-
14
-
-
38049078557
-
Multi-authority attribute based encryption
-
Melissa Chase. Multi-authority attribute based encryption. In TCC, pages 515-534, 2007.
-
(2007)
TCC
, pp. 515-534
-
-
Chase, M.1
-
15
-
-
74049163235
-
Improving privacy and security in multi-authority attribute-based encryption
-
Melissa Chase and Sherman S. M. Chow. Improving privacy and security in multi-authority attribute-based encryption. In ACM Conference on Computer and Communications Security, pages 121-130, 2009.
-
(2009)
ACM Conference on Computer and Communications Security
, pp. 121-130
-
-
Chase, M.1
Chow, M.S.S.2
-
16
-
-
78650755198
-
Secure delegation of elliptic-curve pairing
-
Benoît Chevallier-Mames, Jean-Sébastien Coron, Noel McCullagh, David Naccache, and Michael Scott. Secure delegation of elliptic-curve pairing. In CARDIS, pages 24-35, 2010.
-
(2010)
CARDIS
, pp. 24-35
-
-
Chevallier-Mames, B.1
Coron, J.2
McCullagh, N.3
Naccache, D.4
Scott, M.5
-
17
-
-
77957002840
-
Improved delegation of computation using fully homomorphic encryption
-
Kai-Min Chung, Yael Kalai, and Salil P. Vadhan. Improved delegation of computation using fully homomorphic encryption. In CRYPTO, pages 483-501, 2010.
-
(2010)
CRYPTO
, pp. 483-501
-
-
Chung, K.1
Kalai, Y.2
Vadhan, S.P.3
-
18
-
-
84955339164
-
Secure integration of asymmetric and symmetric encryption schemes
-
Eiichiro Fujisaki and Tatsuaki Okamoto. Secure integration of asymmetric and symmetric encryption schemes. In CRYPTO '99, volume 1666, pages 537-554, 1999.
-
(1999)
CRYPTO '99
, vol.1666
, pp. 537-554
-
-
Fujisaki, E.1
Okamoto, T.2
-
19
-
-
85032883059
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
Taher El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms. In CRYPTO, pages 10-18, 1984.
-
(1984)
CRYPTO
, pp. 10-18
-
-
El Gamal, T.1
-
20
-
-
77957005936
-
Non-interactive verifiable computing: Outsourcing computation to untrusted workers
-
Rosario Gennaro, Craig Gentry, and Bryan Parno. Non-interactive verifiable computing: Outsourcing computation to untrusted workers. In CRYPTO, pages 465-482, 2010.
-
(2010)
CRYPTO
, pp. 465-482
-
-
Gennaro, R.1
Gentry, C.2
Parno, B.3
-
21
-
-
70350642087
-
Fully homomorphic encryption using ideal lattices
-
Craig Gentry. Fully homomorphic encryption using ideal lattices. In STOC, pages 169-178, 2009.
-
(2009)
STOC
, pp. 169-178
-
-
Gentry, C.1
-
22
-
-
79957974657
-
Implementing Gentry's fully-homomorphic encryption scheme
-
Craig Gentry and Shai Halevi. Implementing Gentry's fully-homomorphic encryption scheme. In EUROCRYPT, pages 129-148, 2011.
-
(2011)
EUROCRYPT
, pp. 129-148
-
-
Gentry, C.1
Halevi, S.2
-
23
-
-
49049111604
-
Bounded ciphertext policy attributebased encryption
-
Vipul Goyal, Abishek Jain, Omkant Pandey, and Amit Sahai. Bounded ciphertext policy attributebased encryption. In ICALP, pages 579-591, 2008.
-
(2008)
ICALP
, pp. 579-591
-
-
Goyal, V.1
Jain, A.2
Pandey, O.3
Sahai, A.4
-
24
-
-
34547273527
-
Attribute-based encryption for finegrained access control of encrypted data
-
Vipul Goyal, Omkant Pandey, Amit Sahai, and Brent Waters. Attribute-based encryption for finegrained access control of encrypted data. In ACM Conference on Computer and Communications Security, pages 89-98, 2006.
-
(2006)
ACM Conference on Computer and Communications Security
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
27
-
-
44449129423
-
Predicate encryption supporting disjunctions, polynomial equations, and inner products
-
Jonathan Katz, Amit Sahai, and Brent Waters. Predicate encryption supporting disjunctions, polynomial equations, and inner products. In EUROCRYPT, pages 146-162, 2008.
-
(2008)
EUROCRYPT
, pp. 146-162
-
-
Katz, J.1
Sahai, A.2
Waters, B.3
-
28
-
-
77954635558
-
Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption
-
Allison Lewko, Tatsuaki Okamoto, Amit Sahai, Katsuyuki Takashima, and Brent Waters. Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption. In EUROCRYPT, pages 62-91, 2010.
-
(2010)
EUROCRYPT
, pp. 62-91
-
-
Lewko, A.1
Okamoto, T.2
Sahai, A.3
Takashima, K.4
Waters, B.5
-
29
-
-
79953164949
-
Achieving leakage resilience through dual system encryption
-
Allison Lewko, Yannis Rouselakis, and Brent Waters. Achieving leakage resilience through dual system encryption. In TCC, pages 70-88, 2011.
-
(2011)
TCC
, pp. 70-88
-
-
Lewko, A.1
Rouselakis, Y.2
Waters, B.3
-
31
-
-
77955186544
-
TrustVisor: Efficient TCB Reduction and Attestation
-
May
-
Jonathan M. McCune, Yanlin Li, Ning Qu, Zongwei Zhou, Anupam Datta, Virgil D. Gligor, and Adrian Perrig. TrustVisor: Efficient TCB Reduction and Attestation. In IEEE Symposium on Security and Privacy, pages 143-158, May 2010.
-
(2010)
IEEE Symposium on Security and Privacy
, pp. 143-158
-
-
McCune, J.M.1
Li, Y.2
Qu, N.3
Zhou, Z.4
Datta, A.5
Gligor, V.D.6
Perrig, A.7
-
32
-
-
34548722186
-
Minimal tcb code execution (extended abstract)
-
Jonathan M. McCune, Bryan Parno, Adrian Perrig, Michael K. Reiter, and Arvind Seshadri. Minimal tcb code execution (extended abstract). In IEEE Symposium on Security and Privacy, pages 267-272, 2007.
-
(2007)
IEEE Symposium on Security and Privacy
, pp. 267-272
-
-
McCune, J.M.1
Parno, B.2
Perrig, A.3
Reiter, M.K.4
Seshadri, A.5
-
34
-
-
23744467453
-
Relationships between selected software measures and latent bug-density: Guidelines for improving quality
-
Subhas C. Misra and Virendra C. Bhavsar. Relationships between selected software measures and latent bug-density: Guidelines for improving quality. In ICCSA'03, pages 724-732, 2003.
-
(2003)
ICCSA'03
, pp. 724-732
-
-
Misra, S.C.1
Bhavsar, V.C.2
-
35
-
-
77957011503
-
Fully secure functional encryption with general relations from the decisional linear assumption
-
Tatsuaki Okamoto and Katsuyuki Takashima. Fully secure functional encryption with general relations from the decisional linear assumption. In CRYPTO, pages 191-208, 2010.
-
(2010)
CRYPTO
, pp. 191-208
-
-
Okamoto, T.1
Takashima, K.2
-
37
-
-
34547325357
-
Secure attribute-based systems
-
Matthew Pirretti, Patrick Traynor, Patrick Mc-Daniel, and Brent Waters. Secure attribute-based systems. In ACM Conference on Computer and Communications Security, pages 99-112, 2006.
-
(2006)
ACM Conference on Computer and Communications Security
, pp. 99-112
-
-
Pirretti, M.1
Traynor, P.2
Mc-Daniel, P.3
Waters, B.4
-
38
-
-
24944554962
-
Fuzzy identitybased encryption
-
Amit Sahai and Brent Waters. Fuzzy identitybased encryption. In EUROCRYPT, pages 457-473, 2005.
-
(2005)
EUROCRYPT
, pp. 457-473
-
-
Sahai, A.1
Waters, B.2
-
39
-
-
34548774576
-
Multidimensional range query over encrypted data
-
Elaine Shi, John Bethencourt, Hubert T.-H. Chan, Dawn Xiaodong Song, and Adrian Perrig. Multidimensional range query over encrypted data. In IEEE Symposium on Security and Privacy, pages 350-364, 2007.
-
(2007)
IEEE Symposium on Security and Privacy
, pp. 350-364
-
-
Shi, E.1
Bethencourt, J.2
Chan, H.H.T.3
Xiaodong Song, D.4
Perrig, A.5
-
40
-
-
85076479278
-
-
OpenSSL: The open source toolkit for SSL/TLS, April 2010
-
The OpenSSL Project v1.0. OpenSSL: The open source toolkit for SSL/TLS. www.openssl.org, April 2010.
-
The OpenSSL Project v1.0
-
-
-
41
-
-
70350345210
-
Dual system encryption: Realizing fully secure IBE and HIBE under simple assumptions
-
Brent Waters. Dual system encryption: Realizing fully secure IBE and HIBE under simple assumptions. In CRYPTO, pages 619-636, 2009.
-
(2009)
CRYPTO
, pp. 619-636
-
-
Waters, B.1
-
42
-
-
79952521560
-
Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization
-
BrentWaters. Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization. In PKC, pages 53-70, 2011.
-
(2011)
PKC
, pp. 53-70
-
-
Waters, B.1
|