Scalable Wildcarded Identity-Based Encryption
暂无分享,去创建一个
Hyunok Oh | Jihye Kim | Seunghwa Lee | Jiwon Lee | Jihye Kim | Hyunok Oh | Jiwon Lee | Seunghwan Lee
[1] Antoine Joux,et al. Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions , 2004, CRYPTO.
[2] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[3] Brent Waters,et al. Efficient Identity-Based Encryption Without Random Oracles , 2005, EUROCRYPT.
[4] Jacob C. N. Schuldt,et al. Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards , 2007, ACISP.
[5] Jonathan Katz,et al. Chosen-Ciphertext Security from Identity-Based Encryption , 2004, SIAM J. Comput..
[6] A. Lewko,et al. Fully Secure HIBE with Short Ciphertexts , 2009 .
[7] Atsuko Miyaji,et al. A ciphertext-policy attribute-based encryption scheme with constant ciphertext length , 2010, Int. J. Appl. Cryptogr..
[8] Nigel P. Smart,et al. Identity-Based Encryption Gone Wild , 2006, ICALP.
[9] Dan Boneh,et al. Efficient Selective Identity-Based Encryption Without Random Oracles , 2011, Journal of Cryptology.
[10] Zhibin Zhou,et al. On efficient ciphertext-policy attribute based encryption and broadcast encryption: extended abstract , 2010, CCS '10.
[11] Angelo De Caro,et al. Generalized Key Delegation for Wildcarded Identity-Based and Inner-Product Encryption , 2012, IEEE Transactions on Information Forensics and Security.
[12] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[13] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[14] Dan Boneh,et al. Generalized Identity Based and Broadcast Encryption Schemes , 2008, ASIACRYPT.
[15] Eike Kiltz,et al. Generalized Key Delegation for Hierarchical Identity-Based Encryption , 2007, ESORICS.
[16] Jianwei Liu,et al. Hierarchical Identity-Based Broadcast Encryption , 2014, ACISP.
[17] Brent Waters,et al. Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys , 2005, CRYPTO.
[18] Dan Boneh,et al. Hierarchical Identity Based Encryption with Constant Size Ciphertext , 2005, EUROCRYPT.