Generalized closest substring encryption
暂无分享,去创建一个
Fuchun Guo | Yi Mu | Willy Susilo | Y. Mu | W. Susilo | Fuchun Guo
[1] Brent Waters,et al. Functional Encryption: Definitions and Challenges , 2011, TCC.
[2] Melissa Chase,et al. Multi-authority Attribute Based Encryption , 2007, TCC.
[3] Vinod Vaikuntanathan,et al. Attribute-based encryption for circuits , 2013, STOC '13.
[4] Henri Gilbert,et al. Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30 - June 3, 2010. Proceedings , 2010, EUROCRYPT.
[5] Edward C. Holmes,et al. Primer Master: a new program for the design and analysis of PCR primers , 1996, Comput. Appl. Biosci..
[6] Colin Boyd,et al. Advances in Cryptology - ASIACRYPT 2001 , 2001 .
[7] Tatsuaki Okamoto,et al. Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption , 2010, IACR Cryptol. ePrint Arch..
[8] Zhibin Zhou,et al. On efficient ciphertext-policy attribute based encryption and broadcast encryption: extended abstract , 2010, CCS '10.
[9] Jaime I. Dávila,et al. Fast and Practical Algorithms for Planted (l, d) Motif Search , 2007, IEEE/ACM Transactions on Computational Biology and Bioinformatics.
[10] Javier Herranz,et al. Constant Size Ciphertexts in Threshold Attribute-Based Encryption , 2010, Public Key Cryptography.
[11] Ran Canetti,et al. Advances in Cryptology – CRYPTO 2012 , 2012, Lecture Notes in Computer Science.
[12] Adam O'Neill,et al. Definitional Issues in Functional Encryption , 2010, IACR Cryptol. ePrint Arch..
[13] Sherman S. M. Chow,et al. Improving privacy and security in multi-authority attribute-based encryption , 2009, CCS.
[14] Ling Cheung,et al. Provably secure ciphertext policy ABE , 2007, CCS '07.
[15] K. Lucas,et al. An improved microcomputer program for finding gene- or gene family-specific oligonucleotides suitable as primers for polymerase chain reactions or as probes , 1991, Comput. Appl. Biosci..
[16] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[17] Michael Wiener,et al. Advances in Cryptology — CRYPTO’ 99 , 1999 .
[18] Dan Boneh,et al. Hierarchical Identity Based Encryption with Constant Size Ciphertext , 2005, EUROCRYPT.
[19] Brent Waters,et al. Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption , 2012, IACR Cryptol. ePrint Arch..
[20] Tatsuaki Okamoto,et al. Secure Integration of Asymmetric and Symmetric Encryption Schemes , 1999, Journal of Cryptology.
[21] Jonathan Katz,et al. Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products , 2008, Journal of Cryptology.
[22] Brent Waters,et al. Functional Encryption for Regular Languages , 2012, CRYPTO.
[23] Aggelos Kiayias,et al. Traceable Signatures , 2004, EUROCRYPT.
[24] Brent Waters,et al. Attribute-Based Encryption for Circuits from Multilinear Maps , 2012, CRYPTO.
[25] Tal Rabin. Advances in Cryptology - CRYPTO 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings , 2010, CRYPTO.
[26] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[27] Amit Sahai,et al. Non-malleable non-interactive zero knowledge and adaptive chosen-ciphertext security , 1999, 40th Annual Symposium on Foundations of Computer Science (Cat. No.99CB37039).
[28] Dániel Marx,et al. The closest substring problem with small distances , 2005, 46th Annual IEEE Symposium on Foundations of Computer Science (FOCS'05).
[29] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[30] Joonsang Baek,et al. New constructions of fuzzy identity-based encryption , 2007, ASIACCS '07.
[31] Ronald Cramer,et al. Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings , 2005, EUROCRYPT.
[32] Bin Ma,et al. Genetic Design of Drugs Without Side-Effects , 2003, SIAM J. Comput..
[33] Brent Waters,et al. Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys , 2005, CRYPTO.
[34] Victor Shoup. Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings , 2005, CRYPTO.
[35] Allison Bishop,et al. Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption , 2010, EUROCRYPT.
[36] Tatsuaki Okamoto,et al. Hierarchical Predicate Encryption for Inner-Products , 2009, ASIACRYPT.
[37] Bin Ma,et al. Distinguishing string selection problems , 2003, SODA '99.
[38] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).