Attribute-Based Encryption with Key Cloning Protection
暂无分享,去创建一个
Reihaneh Safavi-Naini | Siamak Fayyaz Shahandashti | Shaoquan Jiang | M. Jason Hinek | S. F. Shahandashti | R. Safavi-Naini | M. Hinek | Shaoquan Jiang
[1] Joonsang Baek,et al. Token-Controlled Public Key Encryption , 2005, ISPEC.
[2] Carl Pomerance,et al. Advances in Cryptology — CRYPTO ’87 , 2000, Lecture Notes in Computer Science.
[3] Feng Bao,et al. Designated Verifier Signature Schemes: Attacks, New Security Notions and a New Construction , 2005, ICALP.
[4] Michael Wiener,et al. Advances in Cryptology — CRYPTO’ 99 , 1999 .
[5] Yevgeniy Dodis,et al. ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption , 2004, CCS '04.
[6] Rafail Ostrovsky,et al. Attribute-based encryption with non-monotonic access structures , 2007, CCS '07.
[7] Moni Naor,et al. Efficient trace and revoke schemes , 2000, International Journal of Information Security.
[8] Moni Naor,et al. Digital signets: self-enforcing protection of digital information (preliminary version) , 1996, STOC '96.
[9] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[10] Brent Waters,et al. Secure attribute-based systems , 2006, CCS '06.
[11] Dalit Naor,et al. Broadcast Encryption , 1993, Encyclopedia of Multimedia.
[12] Joonsang Baek,et al. New constructions of fuzzy identity-based encryption , 2007, ASIACCS '07.
[13] Hong Chen,et al. On the Security of Delegation in Access Control Systems , 2008, ESORICS.
[14] Dalia Khader,et al. Attribute Based Group Signature with Revocation , 2007, IACR Cryptol. ePrint Arch..
[15] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[16] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[17] Jessica Staddon,et al. A content-driven access control system , 2008, IDtrust '08.
[18] Melissa Chase,et al. Multi-authority Attribute Based Encryption , 2007, TCC.
[19] Amos Fiat,et al. Tracing Traitors , 1994, CRYPTO.
[20] Ali Miri,et al. Using Threshold Attribute-based Encryption for Practical Biometric-based Access Control , 2005, Int. J. Netw. Secur..