Downgradable Identity-based Encryption and Applications
暂无分享,去创建一个
[1] Eike Kiltz,et al. Generalized Key Delegation for Hierarchical Identity-Based Encryption , 2007, ESORICS.
[2] Duong Hieu Phan,et al. Identity-Based Trace and Revoke Schemes , 2011, ProvSec.
[3] Duong Hieu Phan,et al. Identity-Based Traitor Tracing , 2007, Public Key Cryptography.
[4] Eike Kiltz,et al. (Hierarchical) Identity-Based Encryption from Affine Message Authentication , 2014, CRYPTO.
[5] Dan Boneh,et al. Hierarchical Identity Based Encryption with Constant Size Ciphertext , 2005, EUROCRYPT.
[6] Tatsuaki Okamoto,et al. Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption , 2010, IACR Cryptol. ePrint Arch..
[7] Angelo De Caro,et al. Generalized Key Delegation for Wildcarded Identity-Based and Inner-Product Encryption , 2012, IEEE Transactions on Information Forensics and Security.
[8] Nuttapong Attrapadung,et al. Dual System Encryption Framework in Prime-Order Groups via Computational Pair Encodings , 2016, ASIACRYPT.
[9] Olivier Blazy,et al. Adaptive Oblivious Transfer and Generalization , 2016, ASIACRYPT.
[10] Hyunok Oh,et al. Scalable Wildcarded Identity-Based Encryption , 2018, ESORICS.
[11] Allison Bishop,et al. New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques , 2012, CRYPTO.
[12] Nigel P. Smart,et al. Identity-Based Encryption Gone Wild , 2006, ICALP.
[13] Dario Fiore,et al. From Selective to Full Security: Semi-Generic Transformations in the Standard Model , 2012, IACR Cryptol. ePrint Arch..
[14] Nelly Fazio,et al. Outsider-Anonymous Broadcast Encryption with Sublinear Ciphertexts , 2012, Public Key Cryptography.
[15] Hoeteck Wee,et al. Improved Dual System ABE in Prime-Order Groups via Predicate Encodings , 2015, EUROCRYPT.
[16] Matthew Green,et al. Blind Identity-Based Encryption and Simulatable Oblivious Transfer , 2007, ASIACRYPT.
[17] Craig Gentry,et al. Hierarchical ID-Based Cryptography , 2002, ASIACRYPT.
[18] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[19] Jacob C. N. Schuldt,et al. Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards , 2007, ACISP.
[20] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[21] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[22] Brent Waters,et al. Efficient Identity-Based Encryption Without Random Oracles , 2005, EUROCRYPT.
[23] Clifford C. Cocks. An Identity Based Encryption Scheme Based on Quadratic Residues , 2001, IMACC.