Identity-Based Broadcast Encryption for Inner Products
暂无分享,去创建一个
Peng Jiang | Fuchun Guo | Yi Mu | Sha Ma | Jianchang Lai | Y. Mu | Peng Jiang | Sha Ma | Jianchang Lai | F. Guo
[1] Hoeteck Wee,et al. Multi-input Inner-Product Functional Encryption from Pairings , 2017, EUROCRYPT.
[2] Fabrice Benhamouda,et al. CCA-Secure Inner-Product Functional Encryption from Projective Hash Functions , 2017, IACR Cryptol. ePrint Arch..
[3] Zvika Brakerski,et al. Function-Private Functional Encryption in the Private-Key Setting , 2015, Journal of Cryptology.
[4] David J. Wu,et al. Function-Hiding Inner Product Encryption is Practical , 2018, IACR Cryptol. ePrint Arch..
[5] Dong Hoon Lee,et al. Two-Input Functional Encryption for Inner Products from Bilinear Maps , 2018, IACR Cryptol. ePrint Arch..
[6] Damien Stehlé,et al. Fully Secure Functional Encryption for Inner Products, from Standard Assumptions , 2016, CRYPTO.
[7] Sourav Mukhopadhyay,et al. Functional Encryption for Inner Product with Full Function Privacy , 2016, Public Key Cryptography.
[8] Allison Bishop,et al. Function-Hiding Inner Product Encryption , 2015, ASIACRYPT.
[9] Amit Sahai,et al. On the Practical Security of Inner Product Functional Encryption , 2015, Public Key Cryptography.
[10] John M. Pollard,et al. Kangaroos, Monopoly and Discrete Logarithms , 2015, Journal of Cryptology.
[11] Brent Waters,et al. Low Overhead Broadcast Encryption from Multilinear Maps , 2014, IACR Cryptol. ePrint Arch..
[12] Amit Sahai,et al. Multi-Input Functional Encryption , 2014, IACR Cryptol. ePrint Arch..
[13] Dan Boneh,et al. Function-Private Identity-Based Encryption: Hiding the Function in Functional Encryption , 2013, CRYPTO.
[14] Nelly Fazio,et al. Broadcast Steganography , 2013, CT-RSA.
[15] Tatsuaki Okamoto,et al. Fully Secure Unbounded Inner-Product and Attribute-Based Encryption , 2012, ASIACRYPT.
[16] Nelly Fazio,et al. Outsider-Anonymous Broadcast Encryption with Sublinear Ciphertexts , 2012, Public Key Cryptography.
[17] Kenneth G. Paterson,et al. Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model , 2012, Public Key Cryptography.
[18] Aggelos Kiayias,et al. Lower Bounds for Private Broadcast Encryption , 2012, Information Hiding.
[19] Brent Waters,et al. Functional Encryption: Definitions and Challenges , 2011, TCC.
[20] Tatsuaki Okamoto,et al. Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption , 2010, IACR Cryptol. ePrint Arch..
[21] Brent Waters,et al. Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts) , 2009, EUROCRYPT.
[22] Elaine Shi,et al. Predicate Privacy in Encryption Systems , 2009, IACR Cryptol. ePrint Arch..
[23] Ahmed Obied,et al. Broadcast Encryption , 2008, Encyclopedia of Multimedia.
[24] Cécile Delerablée,et al. Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys , 2007, ASIACRYPT.
[25] Jun Furukawa,et al. Identity-Based Broadcast Encryption , 2007, IACR Cryptol. ePrint Arch..
[26] Brent Waters,et al. Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys , 2006, EUROCRYPT.
[27] Craig Gentry,et al. Practical Identity-Based Encryption Without Random Oracles , 2006, EUROCRYPT.
[28] Brent Waters,et al. Privacy in Encrypted Content Distribution Using Private Broadcast Encryption , 2006, Financial Cryptography.
[29] Brent Waters,et al. Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys , 2005, CRYPTO.
[30] Dan Boneh,et al. Hierarchical Identity Based Encryption with Constant Size Ciphertext , 2005, EUROCRYPT.
[31] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[32] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.