Tracing Malicious Proxies in Proxy Re-encryption
暂无分享,去创建一个
[1] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[2] Aggelos Kiayias,et al. Polynomial Reconstruction Based Cryptography , 2001, Selected Areas in Cryptography.
[3] Dan Boneh,et al. Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles , 2004, IACR Cryptol. ePrint Arch..
[4] Kaisa Nyberg,et al. Advances in Cryptology — EUROCRYPT'98 , 1998 .
[5] Taher El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.
[6] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[7] Matthew Green,et al. Improved proxy re-encryption schemes with applications to secure distributed storage , 2006, TSEC.
[8] Susan Hohenberger,et al. Advances in signatures, encryption, and E-Cash from bilinear groups , 2006 .
[9] Ronald Cramer,et al. Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings , 2005, EUROCRYPT.
[10] Aggelos Kiayias,et al. Traceable Signatures , 2004, EUROCRYPT.
[11] Duong Hieu Phan,et al. Identity-Based Traitor Tracing , 2007, Public Key Cryptography.
[12] Nigel P. Smart,et al. Identity-Based Encryption Gone Wild , 2006, ICALP.
[13] Dan Boneh,et al. Collusion-Secure Fingerprinting for Digital Data , 1998, IEEE Trans. Inf. Theory.
[14] Matt Blaze,et al. Divertible Protocols and Atomic Proxy Cryptography , 1998, EUROCRYPT.
[15] Brent Waters,et al. Efficient Identity-Based Encryption Without Random Oracles , 2005, EUROCRYPT.
[16] Michael Wiener,et al. Advances in Cryptology — CRYPTO’ 99 , 1999 .
[17] Ran Canetti,et al. Chosen-ciphertext secure proxy re-encryption , 2007, CCS '07.
[18] Robin Milner,et al. On Observing Nondeterminism and Concurrency , 1980, ICALP.
[19] Brent Waters,et al. Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys , 2006, EUROCRYPT.
[20] Dan Boneh,et al. Collusion-Secure Fingerprinting for Digital Data (Extended Abstract) , 1995, CRYPTO.
[21] Aggelos Kiayias,et al. Self Protecting Pirates and Black-Box Traitor Tracing , 2001, CRYPTO.
[22] Paulo S. L. M. Barreto,et al. Pairing-Friendly Elliptic Curves of Prime Order , 2005, Selected Areas in Cryptography.
[23] Brent Waters,et al. Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys , 2005, CRYPTO.
[24] Victor Shoup. Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings , 2005, CRYPTO.
[25] Tsuyoshi Takagi,et al. Pairing-Based Cryptography - Pairing 2007, First International Conference, Tokyo, Japan, July 2-4, 2007, Proceedings , 2007, Pairing.
[26] Tatsuaki Okamoto,et al. Public Key Cryptography - PKC 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings , 2007, Public Key Cryptography.
[27] Serge Vaudenay,et al. Advances in Cryptology - EUROCRYPT 2006 , 2006, Lecture Notes in Computer Science.
[28] Mike Scott,et al. Authenticated ID-based Key Exchange and remote log-in with simple token and PIN number , 2002, IACR Cryptol. ePrint Arch..
[29] David Pointcheval,et al. About the Security of MTI/C0 and MQV , 2006, SCN.
[30] C. Moler,et al. Advances in Cryptology , 2000, Lecture Notes in Computer Science.
[31] Matthew Green,et al. Identity-Based Proxy Re-encryption , 2007, ACNS.
[32] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[33] Chi Sung Laih,et al. Advances in Cryptology - ASIACRYPT 2003 , 2003 .
[34] Toshihiko Matsuo,et al. Proxy Re-encryption Systems for Identity-Based Encryption , 2007, Pairing.
[35] Dan Boneh,et al. Hierarchical Identity Based Encryption with Constant Size Ciphertext , 2005, EUROCRYPT.
[36] Amos Fiat,et al. Tracing traitors , 2000, IEEE Trans. Inf. Theory.
[37] Kenneth G. Paterson,et al. Certificateless Public Key Cryptography , 2003 .
[38] Ronald Cramer,et al. Public Key Cryptography - PKC 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings , 2008, Public Key Cryptography.
[39] Jan Camenisch,et al. Compact E-Cash , 2005, EUROCRYPT.
[40] Vipul Goyal,et al. Reducing Trust in the PKG in Identity Based Cryptosystems , 2007, CRYPTO.
[41] Yvo Desmedt,et al. Advances in Cryptology — CRYPTO ’94 , 2001, Lecture Notes in Computer Science.
[42] Abhi Shelat,et al. Securely Obfuscating Re-encryption , 2007, TCC.
[43] A. J. Menezes,et al. Advances in Cryptology - CRYPTO 2007, 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings , 2007, CRYPTO.