Constant Size Ciphertexts in Threshold Attribute-Based Encryption
暂无分享,去创建一个
Javier Herranz | Carla Ràfols | Fabien Laguillaumie | Fabien Laguillaumie | Javier Herranz | Carla Ràfols
[1] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[2] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[3] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[4] Aggelos Kiayias,et al. BiTR: Built-in Tamper Resilience , 2011, IACR Cryptol. ePrint Arch..
[5] Yuan Zhou,et al. Efficient ID-based Broadcast Threshold Decryption in Ad Hoc Network , 2006, First International Multi-Symposiums on Computer and Computational Sciences (IMSCCS'06).
[6] Refik Molva,et al. Policy-Based Cryptography and Applications , 2005, Financial Cryptography.
[7] Adi Shamir,et al. How to share a secret , 1979, CACM.
[8] Arto Salomaa,et al. Public-Key Cryptography , 1991, EATCS Monographs on Theoretical Computer Science.
[9] Paz Morillo,et al. Extensions of access structures and their cryptographic applications , 2010, Applicable Algebra in Engineering, Communication and Computing.
[10] Dan Boneh,et al. Hierarchical Identity Based Encryption with Constant Size Ciphertext , 2005, EUROCRYPT.
[11] Allison Bishop,et al. Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption , 2010, EUROCRYPT.
[12] Atsuko Miyaji,et al. A ciphertext-policy attribute-based encryption scheme with constant ciphertext length , 2009, Int. J. Appl. Cryptogr..
[13] David Pointcheval,et al. Dynamic Threshold Public-Key Encryption , 2008, CRYPTO.
[14] Amit Sahai,et al. Bounded Ciphertext Policy Attribute Based Encryption , 2008, ICALP.
[15] Paz Morillo,et al. CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts , 2007, ProvSec.
[16] Ling Cheung,et al. Provably secure ciphertext policy ABE , 2007, CCS '07.
[17] Michael Scott,et al. A Taxonomy of Pairing-Friendly Elliptic Curves , 2010, Journal of Cryptology.
[18] Joseph Bonneau,et al. What's in a Name? , 2020, Financial Cryptography.
[19] Aggelos Kiayias,et al. Traceable Signatures , 2004, EUROCRYPT.
[20] Nigel P. Smart,et al. Escrow-free encryption supporting cryptographic workflow , 2006, International Journal of Information Security.
[21] Tatsuaki Okamoto,et al. How to Enhance the Security of Public-Key Encryption at Minimum Cost , 1999, Public Key Cryptography.
[22] Robin Milner,et al. On Observing Nondeterminism and Concurrency , 1980, ICALP.
[23] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization , 2011, Public Key Cryptography.
[24] Jonathan Katz,et al. Chosen-Ciphertext Security from Identity-Based Encryption , 2004, SIAM J. Comput..
[25] Melissa Chase,et al. Multi-authority Attribute Based Encryption , 2007, TCC.
[26] Ronald Cramer,et al. Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings , 2005, EUROCRYPT.
[27] Ran Canetti,et al. An Efficient Threshold Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack , 1999, EUROCRYPT.
[28] Martijn Stam. Beyond Uniformity: Better Security/Efficiency Tradeoffs for Compression Functions , 2008, CRYPTO.
[29] Jacques Stern,et al. Advances in Cryptology — EUROCRYPT ’99 , 1999, Lecture Notes in Computer Science.
[30] Jonathan Katz,et al. Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products , 2008, Journal of Cryptology.
[31] Nigel P. Smart,et al. Advances in Cryptology - EUROCRYPT 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings , 2008, EUROCRYPT.
[32] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[33] Paz Morillo,et al. Extended Access Structures and Their Cryptographic Applications , 2008, IACR Cryptol. ePrint Arch..