A multi-authority approach to various predicate encryption types
暂无分享,去创建一个
[1] Fuchun Guo,et al. A Tag Based Encoding: An Efficient Encoding for Predicate Encryption in Prime Order Groups , 2016, SCN.
[2] Brent Waters,et al. Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions , 2009, IACR Cryptol. ePrint Arch..
[3] Nuttapong Attrapadung,et al. Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings , 2015, CT-RSA.
[4] Dan Boneh,et al. Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles , 2004, IACR Cryptol. ePrint Arch..
[5] Tatsuaki Okamoto,et al. Full-Hiding (Unbounded) Multi-Input Inner Product Functional Encryption from the k-Linear Assumption , 2018, IACR Cryptol. ePrint Arch..
[6] Hoeteck Wee,et al. Fully, (Almost) Tightly Secure IBE and Dual System Groups , 2013, CRYPTO.
[7] Stefan Katzenbeisser,et al. Distributed Attribute-Based Encryption , 2009, ICISC.
[8] Hoeteck Wee,et al. Multi-input Inner-Product Functional Encryption from Pairings , 2017, EUROCRYPT.
[9] Brent Waters,et al. Conjunctive, Subset, and Range Queries on Encrypted Data , 2007, TCC.
[10] Melissa Chase,et al. Multi-authority Attribute Based Encryption , 2007, TCC.
[11] Gilles Barthe,et al. Generic Transformations of Predicate Encodings: Constructions and Applications , 2017, CRYPTO.
[12] Brent Waters,et al. Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption , 2015, Financial Cryptography.
[13] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[14] Sherman S. M. Chow,et al. Improving privacy and security in multi-authority attribute-based encryption , 2009, CCS.
[15] Hideki Imai,et al. Dual-Policy Attribute Based Encryption , 2009, ACNS.
[16] Allison Bishop,et al. Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption , 2010, EUROCRYPT.
[17] Brent Waters,et al. Identity-Based Encryption Secure against Selective Opening Attack , 2011, TCC.
[18] Allison Bishop,et al. Decentralizing Attribute-Based Encryption , 2011, IACR Cryptol. ePrint Arch..
[19] Marc Joye,et al. Decentralized Policy-Hiding ABE with Receiver Privacy , 2018, ESORICS.
[20] Allison Bishop,et al. New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts , 2010, IACR Cryptol. ePrint Arch..
[21] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[22] Hoeteck Wee,et al. Dual System Encryption via Predicate Encodings , 2014, TCC.
[23] Hoeteck Wee,et al. Improved Dual System ABE in Prime-Order Groups via Predicate Encodings , 2015, EUROCRYPT.
[24] Brent Waters,et al. Functional Encryption for Regular Languages , 2012, CRYPTO.
[25] Nuttapong Attrapadung,et al. Dual System Encryption via Doubly Selective Security: Framework, Fully-secure Functional Encryption for Regular Languages, and More , 2014, IACR Cryptol. ePrint Arch..
[26] Tatsuaki Okamoto,et al. Decentralized Attribute-Based Signatures , 2013, Public Key Cryptography.
[27] Allison Bishop,et al. New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques , 2012, CRYPTO.
[28] Melissa Chase,et al. Simplifying Design and Analysis of Complex Predicate Encryption Schemes , 2017, EUROCRYPT.
[29] Melissa Chase,et al. A Study of Pair Encodings: Predicate Encryption in Prime Order Groups , 2016, TCC.