1 |
D. Boneh, B. Lynn and H. Shacham, 'Short Signatures from the Weil Pairing,' in Advances in Cryptology - Asiacrypt 2001, LNCS 2248, pp. 514-532, 2001
|
2 |
J. C. Cha and J. H. Cheon, 'An Identity-Based Signature from Gap Diffie-Hellman Groups, ' in PKC 03, LNCS 2567, pp. 18-30, 2003
|
3 |
D. Naor, M. Naor, and J. Lotspiech. 'Revocation and Tracing Schemes for Stateless Receivers,' in Advances in Cryptology - Crypto '01, pages 41 {62, Berlin, 2001. Springer-Verlag. Lecture Notes in Computer Science Volume 2139
|
4 |
Arvind Narayanan, C. Pandu Rangan, Kwangjo Kim, 'Practical Pay TV Schemes', in ACISP 2003, 192-203, 2003
|
5 |
E. Riedel, M. Kallahalla and R. Swaminathan, 'A Framework for Evaluating Storage System Security,' in FAST 02, pp. 15-30, 2002
|
6 |
R. Canetti, S. Halevi and J. Katz, 'A Forward-Secure Public-Key Encryption Scheme,' in Advances in Cryptology - Eurocrypt 2003, LNCS 2656, pp. 255-271, 2003
|
7 |
J. Horwitz and B. Lynn, 'Toward Hierarchical Identity-Based Encryption,' in Advances in Cryptology - Eurocrypt 2003, LNCS 2332, pp. 466-481, 2002
|
8 |
K. Fu, 'Group Sharing and Random Access in Cryptographic Storage File Systems,' in Master's thesis, MIT, 1999
|
9 |
M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang and K. Fu, 'Plutus : Scalable Secure File Sharing on Untrusted Storage,' in FAST 03, pp. 29-42. 2003
|
10 |
Y. Dodis and N. Fazio, 'Public Key Broadcast Encryption for Stateless Receivers', in ACM-DRM, 2002
|
11 |
C. Gentry and A. Silverberg, 'Hierarchical ID-Based Cryptography,' in Advances in Cryptology - Asiacrypt 2002, LNCS 2501, pp. 548-566, 2002
|