Secure threshold multi authority attribute based encryption without a central authority
暂无分享,去创建一个
Xiaohui Liang | Zhenfu Cao | Jun Shao | Huang Lin | Xiaohui Liang | Z. Cao | Jun Shao | Huang Lin
[1] Dong Hoon Lee,et al. A forward-secure e-mail protocol without certificated public keys , 2009, Inf. Sci..
[2] Zhenfu Cao,et al. An improved identity-based key agreement protocol and its security proof , 2009, Inf. Sci..
[3] Hugo Krawczyk,et al. Secure Distributed Key Generation for Discrete-Log Based Cryptosystems , 1999, Journal of Cryptology.
[4] Hugo Krawczyk,et al. Robust Threshold DSS Signatures , 1996, Inf. Comput..
[5] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[6] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[7] Amit Sahai,et al. Bounded Ciphertext Policy Attribute Based Encryption , 2008, ICALP.
[8] Hugo Krawczyk,et al. Proactive Secret Sharing Or: How to Cope With Perpetual Leakage , 1995, CRYPTO.
[9] Jianhong Zhang,et al. A novel ID-based designated verifier signature scheme , 2008, Inf. Sci..
[10] Melissa Chase,et al. Multi-authority Attribute Based Encryption , 2007, TCC.
[11] Xiaohui Liang,et al. Secure Threshold Multi Authority Attribute Based Encryption without a Central Authority , 2008, INDOCRYPT.
[12] Ling Cheung,et al. Provably secure ciphertext policy ABE , 2007, CCS '07.
[13] Rafail Ostrovsky,et al. Attribute-based encryption with non-monotonic access structures , 2007, CCS '07.
[14] Zhenfu Cao,et al. A secure identity-based proxy multi-signature scheme , 2009, Inf. Sci..
[15] H. Imai,et al. Efficient and secure multiparty generation of digital signatures based on discrete logarithms , 1993 .
[16] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[17] Brent Waters,et al. Secure attribute-based systems , 2006, CCS '06.
[18] Moti Yung,et al. Optimal-resilience proactive public-key cryptosystems , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.
[19] Markus Jakobsson,et al. Proactive public key and signature systems , 1997, CCS '97.
[20] Tal Rabin,et al. A Simplified Approach to Threshold and Proactive RSA , 1998, CRYPTO.
[21] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[22] Dongho Won,et al. Security weakness in a three-party pairing-based protocol for password authenticated key exchange , 2007, Inf. Sci..