Anonymous Multi-Attribute Encryption with Range Query and Conditional Decryption∗
暂无分享,去创建一个
Dawn Song | Elaine Shi | Adrian Perrig | John Bethencourt | Hubert Chan | E. Shi | D. Song | A. Perrig | J. Bethencourt | H. Chan
[1] Mikhail J. Atallah,et al. Algorithms and Theory of Computation Handbook , 2009, Chapman & Hall/CRC Applied Algorithms and Data Structures series.
[2] Dan Boneh,et al. Hierarchical Identity Based Encryption with Constant Size Ciphertext , 2005, EUROCRYPT.
[3] Antoine Joux,et al. A One Round Protocol for Tripartite Diffie–Hellman , 2000, Journal of Cryptology.
[4] Jonathan Katz,et al. A Forward-Secure Public-Key Encryption Scheme , 2003, Journal of Cryptology.
[5] Hovav Shacham,et al. Short Group Signatures , 2004, CRYPTO.
[6] Brent Waters,et al. Building an Encrypted and Searchable Audit Log , 2004, NDSS.
[7] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[8] Brent Waters,et al. Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles) , 2006, CRYPTO.
[9] Ran Canetti,et al. A Forward-Secure Public-Key Encryption Scheme , 2003, Journal of Cryptology.
[10] Sanjit Chatterjee,et al. Trading Time for Space: Towards an Efficient IBE Scheme with Short(er) Public Parameters in the Standard Model , 2005, ICISC.
[11] Richard S. Varga,et al. Proof of Theorem 6 , 1983 .
[12] Dan Boneh,et al. Secure Identity Based Encryption Without Random Oracles , 2004, CRYPTO.
[13] Alexandre Brandwajn,et al. A model of a time sharing virtual memory system solved using equivalence and decomposition methods , 1974, Acta Informatica.
[14] Christos Faloutsos,et al. Analysis of the Clustering Properties of the Hilbert Space-Filling Curve , 2001, IEEE Trans. Knowl. Data Eng..
[15] Craig Gentry,et al. Hierarchical ID-Based Cryptography , 2002, ASIACRYPT.
[16] Rafail Ostrovsky,et al. Public Key Encryption with Keyword Search , 2004, EUROCRYPT.
[17] Jon Louis Bentley,et al. Multidimensional binary search trees used for associative searching , 1975, CACM.
[18] Ben Lynn,et al. Toward Hierarchical Identity-Based Encryption , 2002, EUROCRYPT.
[19] Brent Waters,et al. Conjunctive, Subset, and Range Queries on Encrypted Data , 2007, TCC.
[20] Dan Boneh,et al. Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles , 2004, IACR Cryptol. ePrint Arch..
[21] B. Mandelbrot. Fractal Geometry of Nature , 1984 .
[22] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[23] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[24] BentleyJon Louis. Multidimensional binary search trees used for associative searching , 1975 .
[25] Brent Waters,et al. Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys , 2006, EUROCRYPT.
[26] David Naccache,et al. Secure and practical identity-based encryption , 2005, IET Inf. Secur..
[27] Brent Waters,et al. Efficient Identity-Based Encryption Without Random Oracles , 2005, EUROCRYPT.
[28] Clifford C. Cocks. An Identity Based Encryption Scheme Based on Quadratic Residues , 2001, IMACC.
[29] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[30] Yevgeniy Dodis,et al. ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption , 2004, CCS '04.
[31] Mihir Bellare,et al. Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions , 2005, Journal of Cryptology.