Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application
暂无分享,去创建一个
Pieter H. Hartel | Svetla Nikova | Willem Jonker | Milan Petkovic | Luan Ibraimi | P. Hartel | W. Jonker | M. Petkovic | S. Nikova | L. Ibraimi
[1] Ronald Cramer,et al. Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings , 2005, EUROCRYPT.
[2] Rafail Ostrovsky,et al. Fast Digital Identity Revocation (Extended Abstract) , 1998, CRYPTO.
[3] Ali Miri,et al. Using Mediated Identity-Based Cryptography to Support Role-Based Access Control , 2004, ISC.
[4] Ling Cheung,et al. Provably secure ciphertext policy ABE , 2007, CCS '07.
[5] Dan Boneh,et al. Fine-grained control of security capabilities , 2004, TOIT.
[6] Michael Wiener,et al. Advances in Cryptology — CRYPTO’ 99 , 1999 .
[7] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[8] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[9] Brent Waters,et al. Secure attribute-based systems , 2006, CCS '06.
[10] Victor Shoup,et al. Lower Bounds for Discrete Logarithms and Related Problems , 1997, EUROCRYPT.
[11] Walter Fumy,et al. Advances in Cryptology — EUROCRYPT ’97 , 2001, Lecture Notes in Computer Science.
[12] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[13] Ali Miri,et al. Efficient Revocation of Dynamic Security Privileges in Hierarchically Structured Communities , 2004, PST.
[14] Rafail Ostrovsky,et al. Attribute-based encryption with non-monotonic access structures , 2007, CCS '07.
[15] D. Koo,et al. HIPAA privacy rule and public health; guidance from CDC and the U.S. Department of Health and Human Services , 2003 .
[16] Aggelos Kiayias,et al. Self Protecting Pirates and Black-Box Traitor Tracing , 2001, CRYPTO.
[17] Melissa Chase,et al. Multi-authority Attribute Based Encryption , 2007, TCC.
[18] Jean-Jacques Quisquater,et al. Efficient revocation and threshold pairing based cryptosystems , 2003, PODC '03.
[19] Brent Waters,et al. Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles) , 2006, CRYPTO.
[20] Dan Boneh,et al. A Method for Fast Revocation of Public Key Certificates and Security Capabilities , 2001, USENIX Security Symposium.
[21] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[22] Moni Naor,et al. Certificate revocation and certificate update , 1998, IEEE Journal on Selected Areas in Communications.
[23] Hugo Krawczyk,et al. Advances in Cryptology - CRYPTO '98 , 1998 .
[24] Rafail Ostrovsky,et al. Public Key Encryption with Keyword Search , 2004, EUROCRYPT.
[25] Mihir Bellare,et al. Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions , 2005, Journal of Cryptology.
[26] Pieter H. Hartel,et al. Efficient and Provable Secure Ciphertext-Policy Attribute-Based Encryption Schemes , 2008, ISPEC.
[27] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[28] Adi Shamir,et al. How to share a secret , 1979, CACM.
[29] Sean W. Smith,et al. Distributing security-mediated PKI , 2004, International Journal of Information Security.
[30] Yvo Desmedt,et al. Threshold Cryptosystems , 1989, CRYPTO.