Compact Anonymous Hierarchical Identity-Based Encryption with Constant Size Private Keys
暂无分享,去创建一个
Yi Mu | Qing Wu | Leyou Zhang
[1] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[2] M. Bellare,et al. Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions , 2008, Journal of Cryptology.
[3] Brent Waters,et al. Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions , 2009, IACR Cryptol. ePrint Arch..
[4] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[5] Koutarou Suzuki,et al. Fully Secure Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts , 2011, IACR Cryptol. ePrint Arch..
[6] Zhong Chen,et al. New Fully Secure Hierarchical Identity-Based Encryption with Constant Size Ciphertexts , 2011, ISPEC.
[7] David Mandell Freeman,et al. Converting Pairing-Based Cryptosystems from Composite-Order Groups to Prime-Order Groups , 2010, EUROCRYPT.
[8] Yupu Hu,et al. Hierarchical Identity‐Based Encryption with Constant‐Size Private Keys , 2012 .
[9] Dong Hoon Lee,et al. Anonymous HIBE: Compact Construction Over Prime-Order Groups , 2013, IEEE Trans. Inf. Theory.
[10] Craig Gentry,et al. Hierarchical ID-Based Cryptography , 2002, ASIACRYPT.
[11] Palash Sarkar,et al. Anonymous Constant-Size Ciphertext HIBE from Asymmetric Pairings , 2013, IMACC.
[12] Hovav Shacham,et al. Short Group Signatures , 2004, CRYPTO.
[13] Rafail Ostrovsky,et al. Public Key Encryption with Keyword Search , 2004, EUROCRYPT.
[14] Dario Fiore,et al. Verifiable Random Functions from Identity-Based Key Encapsulation , 2009, EUROCRYPT.
[15] Dan Boneh,et al. Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles , 2004, IACR Cryptol. ePrint Arch..
[16] Angelo De Caro,et al. Fully Secure Anonymous HIBE and Secret-Key Anonymous IBE with Short Ciphertexts , 2010, Pairing.
[17] Brent Waters,et al. Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles) , 2006, CRYPTO.
[18] Dan Boneh,et al. Hierarchical Identity Based Encryption with Constant Size Ciphertext , 2005, EUROCRYPT.
[19] Léo Ducas,et al. Anonymity from Asymmetry: New Constructions for Anonymous HIBE , 2010, CT-RSA.
[20] Elaine Shi,et al. Delegating Capabilities in Predicate Encryption Systems , 2008, ICALP.