Revisiting Attribute-Based Encryption With Verifiable Outsourced Decryption
暂无分享,去创建一个
Hui Ma | Rui Zhang | Suqing Lin | Suqing Wang
[1] Mayur D. Ghodeswar,et al. Cipher Text Policy Attribute-Based Encryption Supporting Flexible Attributes , 2017 .
[2] Jin Li,et al. Securely Outsourcing Attribute-Based Encryption with Checkability , 2014, IEEE Transactions on Parallel and Distributed Systems.
[3] Brent Waters,et al. Online/Offline Attribute-Based Encryption , 2014, IACR Cryptol. ePrint Arch..
[4] Jianfeng Ma,et al. Fine-Grained Access Control System Based on Outsourced Attribute-Based Encryption , 2013, ESORICS.
[5] Robert H. Deng,et al. Attribute-Based Encryption With Verifiable Outsourced Decryption , 2013, IEEE Transactions on Information Forensics and Security.
[6] Ian Miers,et al. Charm: a framework for rapidly prototyping cryptosystems , 2013, Journal of Cryptographic Engineering.
[7] Brent Waters,et al. Attribute-Based Encryption with Fast Decryption , 2013, Public Key Cryptography.
[8] Javier Herranz,et al. Attribute-based encryption schemes with constant-size ciphertexts , 2012, Theor. Comput. Sci..
[9] Matthew Green,et al. Outsourcing the Decryption of ABE Ciphertexts , 2011, USENIX Security Symposium.
[10] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization , 2011, Public Key Cryptography.
[11] Craig Gentry,et al. Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers , 2010, CRYPTO.
[12] Hugo Krawczyk,et al. Cryptographic Extraction and Key Derivation: The HKDF Scheme , 2010, IACR Cryptol. ePrint Arch..
[13] Yael Tauman Kalai,et al. Improved Delegation of Computation using Fully Homomorphic Encryption , 2010, IACR Cryptol. ePrint Arch..
[14] Allison Bishop,et al. Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption , 2010, EUROCRYPT.
[15] David Naccache,et al. Secure Delegation of Elliptic-Curve Pairing , 2010, IACR Cryptol. ePrint Arch..
[16] Sean W. Smith,et al. Batch Pairing Delegation , 2007, IWSEC.
[17] Ling Cheung,et al. Provably secure ciphertext policy ABE , 2007, CCS '07.
[18] Rafail Ostrovsky,et al. Attribute-based encryption with non-monotonic access structures , 2007, CCS '07.
[19] Yehuda Lindell,et al. Introduction to Modern Cryptography (Chapman & Hall/Crc Cryptography and Network Security Series) , 2007 .
[20] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[21] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[22] Matthew Green,et al. Improved proxy re-encryption schemes with applications to secure distributed storage , 2006, TSEC.
[23] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[24] Dan Boneh,et al. Evaluating 2-DNF Formulas on Ciphertexts , 2005, TCC.
[25] Eyal Kushilevitz,et al. Exposure-Resilient Functions and All-or-Nothing Transforms , 2000, EUROCRYPT.
[26] Matt Blaze,et al. Divertible Protocols and Atomic Proxy Cryptography , 1998, EUROCRYPT.
[27] Ronald L. Rivest,et al. All-or-Nothing Encryption and the Package Transform , 1997, FSE.
[28] Torben P. Pedersen. Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing , 1991, CRYPTO.
[29] Moon Sung Lee,et al. Efficient Delegation of Pairing Computation , 2005, IACR Cryptol. ePrint Arch..
[30] V. Shoup. Information technology-Security techniques-Encryption algorithms-Part 2 : Asymmetric Ciphers , 2004 .
[31] Luca Trevisan,et al. Introduction to Modern Cryptography , 2000 .