New Fuzzy Identity-Based Encryption in the Standard Model
暂无分享,去创建一个
Xinpeng Zhang | Yanli Ren | Dawu Gu | Shuozhong Wang | Xinpeng Zhang | Shuozhong Wang | Dawu Gu | Yanli Ren
[1] Brent Waters,et al. Secure attribute-based systems , 2006, CCS '06.
[2] Craig Gentry,et al. Practical Identity-Based Encryption Without Random Oracles , 2006, EUROCRYPT.
[3] Ran Canetti,et al. A Forward-Secure Public-Key Encryption Scheme , 2003, Journal of Cryptology.
[4] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[5] Ran Canetti,et al. The random oracle methodology, revisited , 2000, JACM.
[6] Amit Sahai,et al. Non-malleable non-interactive zero knowledge and adaptive chosen-ciphertext security , 1999, 40th Annual Symposium on Foundations of Computer Science (Cat. No.99CB37039).
[7] Brent Waters,et al. Efficient Identity-Based Encryption Without Random Oracles , 2005, EUROCRYPT.
[8] Dan Boneh,et al. Hierarchical Identity Based Encryption with Constant Size Ciphertext , 2005, EUROCRYPT.
[9] Brent Waters,et al. Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys , 2005, CRYPTO.
[10] Sanjit Chatterjee,et al. Trading Time for Space: Towards an Efficient IBE Scheme with Short(er) Public Parameters in the Standard Model , 2005, ICISC.
[11] Jianhua Li,et al. Delegatability of an Identity Based Strong Designated Verifier Signature Scheme , 2010, Informatica.
[12] David Naccache,et al. Secure and Practical Identity-based Encryption , 2005 .
[13] Wei Gao,et al. One-Round ID-Based Threshold Signature Scheme from Bilinear Pairings , 2009, Informatica.
[14] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[15] Dan Boneh,et al. Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles , 2004, IACR Cryptol. ePrint Arch..
[16] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[17] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[18] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[19] Joonsang Baek,et al. New constructions of fuzzy identity-based encryption , 2007, ASIACCS '07.
[20] Dan Boneh,et al. Secure Identity Based Encryption Without Random Oracles , 2004, CRYPTO.