Expressive Bandwidth-Efficient Attribute Based Signature and Signcryption in Standard Model
暂无分享,去创建一个
[1] Allison Bishop,et al. Decentralizing Attribute-Based Encryption , 2011, IACR Cryptol. ePrint Arch..
[2] Manoj Prabhakaran,et al. Attribute-Based Signatures , 2011, CT-RSA.
[3] Reihaneh Safavi-Naini,et al. Threshold Attribute-Based Signcryption , 2010, SCN.
[4] Cheng Chen,et al. Fully Secure Attribute-Based Systems with Short Ciphertexts/Signatures and Threshold Access Structures , 2013, CT-RSA.
[5] Reihaneh Safavi-Naini,et al. Short Pairing-Efficient Threshold-Attribute-Based Signature , 2012, Pairing.
[6] Kun Peng,et al. Attack against a batch zero-knowledge proof system , 2012, IET Inf. Secur..
[7] Frederik Vercauteren,et al. Practical Realisation and Elimination of an ECC-Related Software Bug Attack , 2012, CT-RSA.
[8] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization , 2011, Public Key Cryptography.
[9] Wenfen Liu,et al. Traceable attribute-based signcryption , 2014, Secur. Commun. Networks.
[10] Aijun-J. Ge,et al. Attribute-based Signature Scheme with Constant Size Signature ⋆ , 2012 .
[11] Javier Herranz,et al. Short Attribute-Based Signatures for Threshold Predicates , 2012, CT-RSA.
[12] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[13] Henri Gilbert,et al. Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30 - June 3, 2010. Proceedings , 2010, EUROCRYPT.
[14] C. Pandu Rangan,et al. ID Based Signcryption Scheme in Standard Model , 2012, ProvSec.
[15] Javier Herranz,et al. Attribute-based encryption schemes with constant-size ciphertexts , 2012, Theor. Comput. Sci..
[16] Jianying Zhou,et al. Information and Communications Security , 2013, Lecture Notes in Computer Science.
[17] Aggelos Kiayias,et al. Topics in Cryptology - CT-RSA 2011 - The Cryptographers' Track at the RSA Conference 2011, San Francisco, CA, USA, February 14-18, 2011. Proceedings , 2011, CT-RSA.
[18] Xiaofeng Liao,et al. Body Area Network Security: A Fuzzy Attribute-Based Signcryption Scheme , 2013, IEEE Journal on Selected Areas in Communications.
[19] Atsuko Miyaji,et al. Dynamic attribute-based signcryption without random oracles , 2012, Int. J. Appl. Cryptogr..
[20] Yuliang Zheng,et al. Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) , 1997, CRYPTO.
[21] Dongqing Xie,et al. Attribute-based signature and its applications , 2010, ASIACCS '10.
[22] Ronald Cramer,et al. Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings , 2005, EUROCRYPT.
[23] Tanja Lange,et al. Pairing-Based Cryptography – Pairing 2012 , 2012, Lecture Notes in Computer Science.
[24] Josep Domingo-Ferrer,et al. Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts , 2010, ICICS.
[25] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[26] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[27] Changji Wang,et al. Attribute-based Signcryption with Ciphertext-policy and Claim-predicate Mechanism , 2011, 2011 Seventh International Conference on Computational Intelligence and Security.
[28] Rafail Ostrovsky,et al. Attribute-based encryption with non-monotonic access structures , 2007, CCS '07.
[29] Ed Dawson,et al. Topics in Cryptology – CT-RSA 2013 , 2013, Lecture Notes in Computer Science.
[30] Ratna Dutta,et al. Computationally Efficient Expressive Key-Policy Attribute Based Encryption Schemes with Constant-Size Ciphertext , 2013, ICICS.
[31] Rosario Gennaro,et al. Public Key Cryptography - PKC 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings , 2011, Public Key Cryptography.
[32] Burton S. Kaliski. Advances in Cryptology - CRYPTO '97 , 1997 .
[33] Mingchu Li,et al. Attribute-based ring signcryption scheme , 2013, Secur. Commun. Networks.
[34] Allison Bishop,et al. Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption , 2010, EUROCRYPT.