Efficient and Provable Secure Ciphertext-Policy Attribute-Based Encryption Schemes
暂无分享,去创建一个
Pieter H. Hartel | Qiang Tang | Willem Jonker | Luan Ibraimi | P. Hartel | Qiang Tang | W. Jonker | L. Ibraimi
[1] Melissa Chase,et al. Multi-authority Attribute Based Encryption , 2007, TCC.
[2] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[3] Brent Waters,et al. Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles) , 2006, CRYPTO.
[4] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[5] Amit Sahai,et al. Bounded Ciphertext Policy Attribute Based Encryption , 2008, ICALP.
[6] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[7] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[8] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[9] Brent Waters,et al. Secure attribute-based systems , 2006, CCS '06.
[10] Ling Cheung,et al. Provably secure ciphertext policy ABE , 2007, CCS '07.
[11] Adi Shamir,et al. How to share a secret , 1979, CACM.
[12] Nigel P. Smart. Access Control Using Pairing Based Cryptography , 2003, CT-RSA.
[13] Mihir Bellare,et al. Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions , 2005, Journal of Cryptology.
[14] Clifford C. Cocks. An Identity Based Encryption Scheme Based on Quadratic Residues , 2001, IMACC.
[15] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[16] Dan Boneh,et al. Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles , 2004, IACR Cryptol. ePrint Arch..
[17] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[18] Rafail Ostrovsky,et al. Public Key Encryption with Keyword Search , 2004, EUROCRYPT.