Access Control Encryption: Enforcing Information Flow with Cryptography
暂无分享,去创建一个
[1] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[2] Manoj Prabhakaran,et al. Rerandomizable RCCA Encryption , 2007, CRYPTO.
[3] Ivan Damgård,et al. A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System , 2001, Public Key Cryptography.
[4] Ilya Mironov,et al. Cryptographic Reverse Firewalls , 2015, EUROCRYPT.
[5] Manuel Blum,et al. Non-interactive zero-knowledge and its applications , 1988, STOC '88.
[6] Manuel Blum,et al. Non-Interactive Zero-Knowledge and Its Applications (Extended Abstract) , 1988, STOC 1988.
[7] Brent Waters,et al. Candidate Indistinguishability Obfuscation and Functional Encryption for all Circuits , 2013, 2013 IEEE 54th Annual Symposium on Foundations of Computer Science.
[8] Brent Waters,et al. Functional Encryption: Definitions and Challenges , 2011, TCC.
[9] Birgit Pfitzmann,et al. Intransitive non-interference for cryptographic purposes , 2003, 2003 Symposium on Security and Privacy, 2003..
[10] Shai Halevi,et al. Enforcing Confinement in Distributed Storage and a Cryptographic Model for Access Control , 2005, IACR Cryptol. ePrint Arch..
[11] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[12] Taher ElGamal,et al. A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .
[13] A. Juels,et al. Universal Re-encryption for Mixnets , 2004, CT-RSA.
[14] Georg Fuchsbauer,et al. Policy Privacy in Cryptographic Access Control , 2015, 2015 IEEE 28th Computer Security Foundations Symposium.
[15] L.,et al. SECURE COMPUTER SYSTEMS : MATHEMATICAL FOUNDATIONS , 2022 .
[16] Taher El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.
[17] K. J. Bma. Integrity considerations for secure computer systems , 1977 .
[18] Jonathan Katz,et al. Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products , 2008, Journal of Cryptology.
[19] Yevgeniy Dodis,et al. Message Transmission with Reverse Firewalls - Secure Communication on Corrupted Machines , 2016, CRYPTO.
[20] Birgit Pfitzmann,et al. Computational probabilistic noninterference , 2004, International Journal of Information Security.
[21] Control Encryption : Enforcing Information Flow with Cryptography ⋆ ⋆ ⋆ , 2021 .
[22] John Langford,et al. Provably Secure Steganography , 2002, IEEE Transactions on Computers.
[23] Stefan Katzenbeisser,et al. Hiding the Policy in Cryptographic Access Control , 2011, STM.
[24] Mikhail J. Atallah,et al. Attribute-Based Access Control with Hidden Policies and Hidden Credentials , 2006, IEEE Transactions on Computers.
[25] Marc Fischlin,et al. Sanitizable Signcryption: Sanitization over Encrypted Data (Full Version) , 2015, IACR Cryptol. ePrint Arch..
[26] Sean W. Smith,et al. Attribute-Based Publishing with Hidden Credentials and Hidden Policies , 2007, NDSS.
[27] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[28] Steven M. Bellovin,et al. Privacy Enhanced Access Control for Outsourced Data Sharing , 2012, Financial Cryptography.