A key-policy attribute-based broadcast encryption
暂无分享,去创建一个
[1] Jin Li,et al. Privacy-Aware Attribute-Based Encryption with User Accountability , 2009, ISC.
[2] Rafail Ostrovsky,et al. Attribute-based encryption with non-monotonic access structures , 2007, CCS '07.
[3] Allison Bishop,et al. Unbounded HIBE and Attribute-Based Encryption , 2011, IACR Cryptol. ePrint Arch..
[4] Jin Li,et al. A2BE: Accountable Attribute-Based Encryption for Abuse Free Access Control , 2009, IACR Cryptol. ePrint Arch..
[5] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[6] Govindaswamy Kalpana,et al. Reliable broadcasting using efficient forward node selection for mobile ad-hoc networks , 2012, Int. Arab J. Inf. Technol..
[7] Xiaochun Cheng,et al. Efficient Identity-based Broadcast Encryption without Random Oracles , 2010, J. Comput..
[8] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[9] Dan Boneh,et al. Evaluating 2-DNF Formulas on Ciphertexts , 2005, TCC.
[10] Amos Fiat,et al. Broadcast Encryption , 1993, CRYPTO.
[11] Yupu Hu,et al. An Identity-based Broadcast Encryption Protocol for Ad Hoc Networks , 2008, 2008 The 9th International Conference for Young Computer Scientists.
[12] Melissa Chase,et al. Multi-authority Attribute Based Encryption , 2007, TCC.
[13] A. Lewko,et al. Fully Secure HIBE with Short Ciphertexts , 2009 .
[14] Allison Bishop,et al. Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption , 2010, EUROCRYPT.
[15] Allison Bishop,et al. Achieving Leakage Resilience through Dual System Encryption , 2011, TCC.
[16] David Pointcheval,et al. Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size Ciphertexts or Decryption Keys , 2007, Pairing.
[17] Brent Waters,et al. Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys , 2005, CRYPTO.
[18] Nicole Vincent,et al. Fuzzy and neuro-fuzzy modeling of a fermentation process , 2009, Int. Arab J. Inf. Technol..
[19] Brent Waters,et al. Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions , 2009, IACR Cryptol. ePrint Arch..
[20] Dan Boneh,et al. Hierarchical Identity Based Encryption with Constant Size Ciphertext , 2005, EUROCRYPT.
[21] Tatsuaki Okamoto,et al. Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption , 2010, IACR Cryptol. ePrint Arch..