THÔNG TIN TÀI LIỆU
Thông tin cơ bản
Định dạng | |
---|---|
Số trang | 260 |
Dung lượng | 3,81 MB |
Nội dung
Ngày đăng: 22/01/2018, 16:42
Nguồn tham khảo
Tài liệu tham khảo | Loại | Chi tiết |
---|---|---|
2. Beimel, A.: Secure Schemes for Secret Sharing and Key Distribution. PhD thesis, Israel Institute of Technology (1996) | Khác | |
3. Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryp- tion. In: IEEE Symposium on Security and Privacy, pp. 321–334 (2007) | Khác | |
4. Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryp- tography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127–144.Springer, Heidelberg (1998) | Khác | |
5. Cheung, L., Newport, C.C.: Provably secure ciphertext policy ABE. In: ACM Con- ference on Computer and Communications Security, pp. 456–465 (2007) | Khác | |
6. Garg, S., Gentry, C., Halevi, S., Sahai, A., Waters, B.: Attribute-based encryption for circuits from multilinear maps. IACR Cryptology ePrint Archive, 2013:128 (2013) | Khác | |
7. Gorbunov, S., Vaikuntanathan, V., Wee, H.: Attribute-based encryption for cir- cuits. In: STOC, pp. 545–554 (2013) | Khác | |
8. Goyal, V., Jain, A., Pandey, O., Sahai, A.: Bounded Ciphertext Policy Attribute Based Encryption. In: Aceto, L., Damg˚ ard, I., Goldberg, L.A., Halld´ orsson, M.M., Ing´ olfsd´ ottir, A., Walukiewicz, I. (eds.) ICALP 2008, Part II. LNCS, vol. 5126, pp. 579–591. Springer, Heidelberg (2008) | Khác | |
9. Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine- grained access control of encrypted data. In: ACM Conference on Computer and Communications Security, pp. 89–98 (2006) | Khác | |
10. Hohenberger, S., Waters, B.: Attribute-based encryption with fast decryption.In: Kurosawa, K., Hanaoka, G. (eds.) PKC 2013. LNCS, vol. 7778, pp. 162–179.Springer, Heidelberg (2013) | Khác | |
11. Katz, J., Sahai, A., Waters, B.: Predicate encryption supporting disjunctions, poly- nomial equations, and inner products. In: Smart, N.P. (ed.) EUROCRYPT 2008.LNCS, vol. 4965, pp. 146–162. Springer, Heidelberg (2008) | Khác | |
12. Lai, J., Deng, R.H., Li, Y.: Fully secure cipertext-policy hiding CP-ABE. In: Bao, F., Weng, J. (eds.) ISPEC 2011. LNCS, vol. 6672, pp. 24–39. Springer, Heidelberg (2011) | Khác | |
13. Lai, J., Deng, R.H., Li, Y.: Expressive cp-abe with partially hidden access struc- tures. In: ASIACCS, pp. 18–19 (2012) | Khác | |
14. Lewko, A., Okamoto, T., Sahai, A., Takashima, K., Waters, B.: Fully secure func- tional encryption: Attribute-based encryption and (Hierarchical) inner product en- cryption. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 62–91.Springer, Heidelberg (2010) | Khác | |
15. Lewko, A., Waters, B.: Decentralizing attribute-based encryption. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 568–588. Springer, Heidelberg (2011) | Khác | |
18. Liang, K., Fang, L., Wong, D.S., Susilo, W.: A ciphertext-policy attribute-based proxy re-encryption with chosen-ciphertext security. IACR Cryptology ePrint Archive, 2013:236 (2013) | Khác | |
19. Liang, X., Cao, Z., Lin, H., Shao, J.: Attribute-based proxy re-encrytpion with delegating capabilities. In: ACM ASIACCS, pp. 276–286 (2009) | Khác | |
20. Luo, S., Hu, J., Chen, Z.: Ciphertext policy attribute-based proxy re-encryption. In:Soriano, M., Qing, S., L´ opez, J. (eds.) ICICS 2010. LNCS, vol. 6476, pp. 401–415.Springer, Heidelberg (2010) | Khác | |
21. M¨ uller, S., Katzenbeisser, S., Eckert, C.: Distributed attribute-based encryption.In: Lee, P.J., Cheon, J.H. (eds.) ICISC 2008. LNCS, vol. 5461, pp. 20–36. Springer, Heidelberg (2009) | Khác | |
22. Nishide, T., Yoneyama, K., Ohta, K.: Attribute-based encryption with partially hidden encryptor-specified access structures. In: Bellovin, S.M., Gennaro, R., Keromytis, A.D., Yung, M. (eds.) ACNS 2008. LNCS, vol. 5037, pp. 111–129.Springer, Heidelberg (2008) | Khác | |
23. Okamoto, T., Takashima, K.: Hierarchical predicate encryption for inner-products.In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 214–231. Springer, Heidelberg (2009) | Khác |
TÀI LIỆU CÙNG NGƯỜI DÙNG
TÀI LIỆU LIÊN QUAN