Tài liệu tham khảo |
Loại |
Chi tiết |
1. S. Agrawal, S. Bhattacherjee, D. H. Phan, D. Stehle, and S. Yamada. Efficient public trace and revoke from standard assumptions Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30 - November 03,2017. ACM 2017, ISBN 978-1-4503-4946-8 |
Sách, tạp chí |
Tiêu đề: |
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security |
|
2. K. Acharya and R. Dutta. Adaptively secure broadcast encryption with dealership. In ICISC 16: 19th International Conference on Information Security and Cryptology, Lecture Notes in Computer Science, pages 161—177 Springer, Heidelberg, Germany, 2017 |
Sách, tạp chí |
Tiêu đề: |
19th International Conference on Information Security and Cryptology, Lecture Notes in Computer Science |
|
3. K. Acharya and R. Dutta. Constructions of Secure Multi-Channel Broadcast Encryption Schemes in Public Key Framework. CANS 2018: International Conference on Cryptology and Network Security, Lecture Notes in Computer Science 11124, Springer 2018, ISBN 978-3-030-00434-7, Naples, Italy |
Sách, tạp chí |
Tiêu đề: |
CANS 2018: International Conference on Cryptology and Network Security |
|
4. Shashank Agrawal and Melissa Chase. A study of pair encodings: Predicate encryption in prime order groups. In Eyal Kushilevitz and Tal Malkin, editors, TCC 2016-A: 13th Theory of Cryptography Conference, Part II, volume 9563 of Lecture Notes in Computer Science, pages 259–288, Tel Aviv, Israel, January 10–13, 2016.Springer, Heidelberg, Germany |
Sách, tạp chí |
Tiêu đề: |
TCC 2016-A: 13th Theory of Cryptography Conference, Part II, "volume 9563 of" Lecture Notes in Computer Science |
|
6. Shashank Agrawal and Melissa Chase. Simplifying design and analysis of complex predicate encryption schemes. In Jean-Sébastien Coron and Jesper Buus Nielsen, editors, Advances in Cryptology – EUROCRYPT 2017, Part I, volume 10210 of Lecture Notes in Computer Science, pages 627–656, Paris, France, May 8–12, 2017.Springer, Heidelberg, Germany |
Sách, tạp chí |
Tiêu đề: |
Advances in Cryptology" – EUROCRYPT 2017, Part I, volume 10210 of "Lecture Notes in Computer Science |
|
7. Nuttapong Attrapadung. Dual system encryption via doubly selective security: Framework, fully secure functional encryption for regular languages, and more. In Phong Q. Nguyen and Elisabeth Oswald, editors, Advances in Cryptology – EUROCRYPT 2014, volume 8441 of Lecture Notes in Computer Science, pages 557– |
Sách, tạp chí |
Tiêu đề: |
Advances in Cryptology – EUROCRYPT 2014", volume 8441 of Lecture "Notes in Computer Science |
|
8. Nuttapong Attrapadung, Goichiro Hanaoka, and Shota Yamada. Conversions among several classes of predicate encryption and applications to ABE with various compactness tradeoffs. In Tetsu Iwata and Jung Hee Cheon, editors, Advances in Cryptology – ASIACRYPT 2015, Part I, volume 9452 of Lecture Notes in Computer Science, pages 575–601, Auckland, New Zealand, November 30 – December 3, 2015.Springer, Heidelberg, Germany |
Sách, tạp chí |
Tiêu đề: |
Advances in Cryptology – ASIACRYPT 2015, Part I", volume 9452 of "Lecture Notes in Computer Science |
|
9. D. Boneh, C. Gentry, and B. Waters. Collusion resistant broadcast encryption with short ciphertexts and private keys. In V. Shoup, editor, Advances in Cryptology – CRYPTO 2005, volume 3621 of Lecture Notes in Computer Science, pages 258–275, Santa Barbara, CA, USA, Aug. 14–18, 2005. Springer, Heidelberg, Germany |
Sách, tạp chí |
Tiêu đề: |
Advances in Cryptology – CRYPTO 2005", volume 3621 of "Lecture Notes in Computer Science |
|
10. D. Boneh, B. Waters, and M. Zhandry. Low overhead broadcast encryption from multilinear maps. In J. A. Garay and R. Gennaro, editors, Advances in Cryptology CRYPTO 2014, Part I, volume 8616 of Lecture Notes in Computer Science, pages 206–223, Santa Barbara, CA, USA, Aug. 17–21, 2014. Springer, Heidelberg, Germany |
Sách, tạp chí |
Tiêu đề: |
Advances in Cryptology CRYPTO 2014, Part I", volume 8616 of "Lecture Notes in Computer Science |
|
12. D. Boneh, A. Sahai, and B. Waters. Fully collusion resistant traitor tracing with short ciphertexts and private keys. In S. Vaudenay, editor, Advances in Cryptology – EUROCRYPT 2006, volume 4004 of Lecture Notes in Computer Science, pages 573– |
Sách, tạp chí |
Tiêu đề: |
Advances in Cryptology – EUROCRYPT 2006", volume 4004 of "Lecture Notes in Computer Science |
|
15. S. Canard, D. H. P. D. Pointcheval, and V. C. Trinh. A new technique for compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption. Theoretical Computer Science, Volume 723, 2018, Pages 51-72, ISSN 0304-3975, 2018 |
Sách, tạp chí |
Tiêu đề: |
Theoretical Computer Science |
|
17. S. Canard, D. H. Phan, and V. C. Trinh. A new technique for compacting secret key in attribute-based broadcast encryption. In CANS 16: 15th International Conference on Cryptology and Network Security, Lecture Notes in Computer Science, pages 594–603. Springer, Heidelberg, Germany, 2016 |
Sách, tạp chí |
Tiêu đề: |
15th International Conference on Cryptology and Network Security, Lecture Notes in Computer Science |
|
19. Chase, M., Chow, S.S. Improving privacy and security in multi-authority attributebased encryption. Proceedings of the 16th ACM Conference on Computer and Communications Security - CCS ’09. pp. 121-130. ACM, New York, NY, USA (2009) |
Sách, tạp chí |
Tiêu đề: |
Proceedings of the 16th ACM Conference on Computer and Communications Security |
|
20. J. Chen, R. Gay, and H. Wee. Improved dual system abe in prime-order groups via predicate encodings. In E. Oswald and M. Fischlin, editors, Proceedings of EUROCRYPT, LNCS 9057, pages 595–624. Springer, 2015 |
Sách, tạp chí |
Tiêu đề: |
Proceedings of EUROCRYPT |
|
21. Cheng Chen, Jie Chen, Hoon Wei Lim, Zhenfeng Zhang, Dengguo Feng, San Ling, and Huaxiong Wang. Fully secure attribute-based systems with short ciphertexts/signatures and threshold access structures. In Ed Dawson, editor, Topics in Cryptology – CT-RSA 2013, volume 7779 of Lecture Notes in Computer Science, pages 50–67, San Francisco, CA, USA, February 25 – March 1, 2013. Springer, Heidelberg, Germany |
Sách, tạp chí |
Tiêu đề: |
Topics in Cryptology – CT-RSA 2013", volume 7779 of "Lecture Notes in Computer Science |
|
22. Cheng Chen, Zhenfeng Zhang, and Dengguo Feng. Efficient ciphertext policy attributebased encryption with constant-size ciphertext and constant computation- cost. In Xavier Boyen and Xiaofeng Chen, editors, ProvSec 2011: 5th International Conference on Provable Security, volume 6980 of Lecture Notes in Computer Science, pages 84– 101, Xi’an, China, October 16–18, 2011. Springer, Heidelberg, Germany |
Sách, tạp chí |
Tiêu đề: |
5th International Conference on Provable Security", volume 6980 of "Lecture Notes in Computer Science |
|
25. C. Delerablée. Identity-based broadcast encryption with constant size ciphertexts and private keys. In K. Kurosawa, editor, Advances in Cryptology – ASIACRYPT 2007, volume 4833 of Lecture Notes in Computer Science, pages 200–215, Kuching, Malaysia, Dec. 2–6, 2007. Springer, Heidelberg, Germany |
Sách, tạp chí |
Tiêu đề: |
Advances in Cryptology – ASIACRYPT 2007", volume 4833 of "Lecture Notes in Computer Science |
|
27. K. Emura, A. Miyaji, A. Nomura, K. Omote, and M. Soshi. A ciphertext-policy attribute-based encryption scheme with constant ciphertext length schemes. In Feng Bao, Hui Li, and Guilin Wang, editors, ISPEC 2009: 5th International Conference on Information Security Practice and Experience, volume 5451 of Lecture Notes in Computer Science, pages 13–23, Xi’an, China, April 13–15 2009. Springer, Heidelberg, Germany |
Sách, tạp chí |
Tiêu đề: |
ISPEC 2009: 5th International Conference on Information Security Practice and Experience, volume 5451 of Lecture Notes in Computer Science |
|
28. A. Fiat and M. Naor. Broadcast encryption. In D. R. Stinson, editor, Advances in Cryptology – CRYPTO’93, volume 773 of Lecture Notes in Computer Science, pages 480–491, Santa Barbara, CA, USA, Aug. 22–26, 1994. Springer, Heidelberg, Germany |
Sách, tạp chí |
Tiêu đề: |
Advances in Cryptology – CRYPTO’93", volume 773 of "Lecture Notes in Computer Science |
|
18. S. Canard and V. C. Trinh. Constant-size ciphertext attribute-based encryption from multi-channel broadcast encryption. In: Ray I., Gaur M., Conti M., Sanghi D., Ka makoti V. (eds) Information Systems Security. ICISS 2016. Lecture Notes in Computer Science, vol 10063. Springer. https://doi.org/10.1007/978-3-319-49806-5-10 |
Link |
|