Anonymous authentication for circuits from correlation-relaxed two-to-one recoding
暂无分享,去创建一个
[1] Manoj Prabhakaran,et al. Attribute-Based Signatures: Achieving Attribute-Privacy and Collusion-Resistance , 2008, IACR Cryptol. ePrint Arch..
[2] Manoj Prabhakaran,et al. Attribute-Based Signatures , 2011, CT-RSA.
[3] Brent Waters,et al. Relaxed Two-to-One Recoding Schemes , 2014, SCN.
[4] Dongqing Xie,et al. Attribute-based signature and its applications , 2010, ASIACCS '10.
[5] Walter Fumy. Key Management , 1991, Computer Security and Industrial Cryptography.
[6] Jin Li,et al. Hidden attribute-based signatures without anonymity revocation , 2010, Inf. Sci..
[7] Yiming Zhao,et al. Efficient Traceable Attribute-Based Signature , 2014, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications.
[8] Tatsuaki Okamoto,et al. Decentralized Attribute-Based Signatures , 2013, Public Key Cryptography.
[9] Jin Li,et al. Securely Outsourcing Attribute-Based Encryption with Checkability , 2014, IEEE Transactions on Parallel and Distributed Systems.
[10] Shaozhen Chen,et al. Attribute-based signature for threshold predicates from lattices , 2015, Secur. Commun. Networks.
[11] Yu Long,et al. Attribute-based signature on lattices , 2014 .
[12] Tatsuaki Okamoto,et al. Efficient Attribute-Based Signatures for Non-Monotone Predicates in the Standard Model , 2014, IEEE Transactions on Cloud Computing.
[13] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[14] Craig Gentry,et al. Fully Secure Functional Encryption without Obfuscation , 2014, IACR Cryptol. ePrint Arch..
[15] Cong Wang,et al. Enhancing attribute-based encryption with attribute hierarchy , 2009, ICC 2009.
[16] Brent Waters,et al. Attribute-Based Encryption for Circuits from Multilinear Maps , 2012, CRYPTO.
[17] Gail-Joon Ahn,et al. Security and Privacy Challenges in Cloud Computing Environments , 2010, IEEE Security & Privacy.
[18] Craig Gentry,et al. Fully Secure Attribute Based Encryption from Multilinear Maps , 2014, IACR Cryptol. ePrint Arch..
[19] Paz Morillo,et al. Revocable Attribute-Based Signatures with Adaptive Security in the Standard Model , 2011, AFRICACRYPT.
[20] Javier Herranz,et al. Short Attribute-Based Signatures for Threshold Predicates , 2012, CT-RSA.
[21] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[22] Craig Gentry,et al. Candidate Multilinear Maps from Ideal Lattices , 2013, EUROCRYPT.
[23] Yupu Hu,et al. Cryptanalysis of GGH Map , 2016, EUROCRYPT.
[24] Chunsheng Gu. Multilinear Maps Using Ideal Lattices without Encodings of Zero , 2015, IACR Cryptol. ePrint Arch..
[25] Haiying Gao,et al. Attribute-Based Encryption for Circuits on Lattices , 2014 .
[26] Reihaneh Safavi-Naini,et al. Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems , 2009, AFRICACRYPT.
[27] Marek R. Ogiela,et al. Linguistic protocols for secure information management and sharing , 2012, Comput. Math. Appl..
[28] Ali El Kaafarani,et al. Decentralized Traceable Attribute-Based Signatures , 2014, CT-RSA.
[29] Shinsaku Kiyomoto,et al. Security issues on IT systems during disasters: a survey , 2013, Journal of Ambient Intelligence and Humanized Computing.
[30] Hongda Li,et al. Attribute-Based Signatures for Circuits from Multilinear Maps , 2014, ISC.