1 |
D. Boneh and M. K. Franklin, "Identity-based encryption from the weil pairing," Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology, Santa Barbara: CA, pp. 213-229, 2001.
|
2 |
X. Boyen and B. Waters, "Anonymous hierarchical identity-based encryption," Proceedings of the 26th Annual International Cryptology Conference on Advances in Cryptology, Santa Barbara: CA, pp. 290-307, 2006.
|
3 |
A. Sahai and B. Waters, "Fuzzy identity-based encryption," Proceedings of the 24th Annual International Conference on Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, pp. 457-473, 2005.
|
4 |
V. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attribute-based encryption for fine-grained access control of encrypted data," Proceedings of the 13th ACM Conference on Computer and Communications Security, Alexandria: VA, pp. 89-98, 2006.
|
5 |
L. Cheung and C. Newport, "Provably secure ciphertext policy ABE," Proceedings of the 14th ACM conference on Computer and Communications Security, Alexandria: VA, pp. 456-465, 2007.
|
6 |
V. Goyal, A. Jain, O. Pandey, and A. Sahai, "Bounded ciphertext policy attribute based encryption," Proceedings of the 35th international colloquium on Automata, Languages and Programming, Reykjavik, Iceland, pp. 579-591, 2008.
|
7 |
J. Bethencourt, A. Sahai, and B. Waters, "Ciphertext-policy attribute-based encryption," Proceedings of the 2007 IEEE Symposium on Security and Privacy, Oakland: CA, pp. 321-334, 2007.
|
8 |
X. Liang, Z. Cao, H. Lin, and J. Shao, "Attribute based proxy reencryption with delegating capabilities," Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, Sidney, Australia, pp. 276-286, 2009.
|
9 |
K. Emura, A. Miyaji, A. Nomura, K. Omote, and M. Soshi, "A ciphertext policy attribute-based encryption scheme with constant ciphertext length," Proceedings of the 5th International Conference on Information Security Practice and Experience, Shaanxi, China, pp. 13-23, 2009.
|
10 |
R. Canetti and S. Hohenberger, "Chosen-ciphertext secure proxy re-encryption," Proceedings of the 14th ACM Conference on Computer and Communications Security, Alexandria: VA, pp. 185-194, 2007.
|
11 |
T. Nishide, K. Yoneyama, and K. Ohta, "Attribute-based encryption with partially hidden encryptor-specified access structures," Proceedings of the 6th International Conference on Applied Cryptography and Network Security, New York: NY, pp. 111-129, 2008.
|
12 |
B. Waters, "Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization," Proceedings of the 14th International Conference on Practice and Theory in Public Key Cryptography Conference on Public Key Cryptography, Taormina, Italy, pp. 53-70, 2008.
|