1 |
S. Mazgon (Editor), "Approved ITU-T Security Definition", Security Compendium, ITU-T, 2005
|
2 |
R. S. Sandhu, E. J. Coyne, H. L. Feinstein, C. E. Youman, "Role-Based Access Control Models", Computer, vol. 29, no. 2, pp. 38-47, 1996.
|
3 |
Keith Frikken, Mikhail Atallah, Jiangtao Li, "Attribute-Based Access Control with Hidden Policies and Hidden Credentials", IEEE Transaction on Computers, vol. 55, no. 10, pp. 1259-1270, 2006.
DOI
ScienceOn
|
4 |
Rifki Sadikin, YoungHo Park, KilHoum Park, and SangJae Moon "Universal Composability Notion for Functional Encryption Schemes," Journal of the Korea Society of Industrial Information Systems, vol.18, no.3, pp.17-26, 2013.
과학기술학회마을
DOI
ScienceOn
|
5 |
Amit Sahai, and Brent Waters. "Fuzzy identity-based encryption." Advances in Cryptology-EUROCRYPT 2005. pp. 457-473, 2005.
|
6 |
J. Bethencourt, Amit Sahai, and Brent Waters. "Ciphertext-policy attribute-based encryption." Security and Privacy, IEEE Symposium, 2007.
|
7 |
V. Goyal, A. Jain, O. Pandey, and A. Sahai, "Bounded ciphertext policy attribute based encryption," in Proceedings of the 35th international colloquium on Automata, Languages and Programming, Part II, ICALP '08, pp. 579-591, 2008.
|
8 |
Allison Lewko, T. Okamoto, A. Sahai, K. Takashima, and B. Waters, "Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption.", Advances in Cryptology-EUROCRYPT 2010. pp. 62-91, 2010.
|
9 |
B. Waters, "Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization," in Proceedings of the 14th international conference on Practice and theory in public key cryptography conference on Public key cryptography, pp. 53-70, 2011.
|
10 |
B. Waters. "Dual system encryption: Realizing fully secure IBE and HIBE under simple assumptions." Advances in Cryptology-CRYPTO 2009. pp. 619-626, 2009.
|
11 |
Allison Lewko and Brent Waters. "New techniques for dual system encryption and fully secure HIBE with short ciphertexts." Theory of Cryptography. Springer Berlin Heidelberg, pp. 455-479, 2010.
|
12 |
Ben Lynn, On the Implementation of Pairing-Based Cryptography, Phd Thesis, Department of Computer Science, Stanford University, USA, 2007.
|
13 |
A. Beimel, Secure schemes for secret sharing and key distribution. PhD thesis, Israel Institute of Technology, 1996.
|
14 |
L. Ibraimi, Q. Tang, P. Hartel, and W. Jonker, "Efficient and provable secure ciphertext-policy attribute-based encryption schemes," in Proceedings of the 5th International Conference on Information Security Practice and Experience, pp. 1-12, 2009.
|
15 |
L. Cheung and C. Newport, "Provably secure ciphertext policy ABE," in Proceedings of the 14th ACM conference on Computer and communications security, pp. 456-465, 2007.
|
16 |
T. Okamoto and K. Takashima, "Fully secure functional encryption with general relations from the decisional linear assumption," in Advances in Cryptology CRYPTO 2010, pp. 191-208, 2010.
|
17 |
Dan Boneh, Amit Sahai, and Brent Waters. "Functional encryption: Definitions and challenges." Theory of Cryptography. Springer Berlin Heidelberg, pp. 253-273, 2011.
|
18 |
C. Marshall and R S Naffah, Programming with GNU Crypto, The Free Software Foundation, 2003.
|
19 |
J. Benaloh and J. Leichter, "Generalized secret sharing and monotone functions," in Proceedings on Advances in cryptology, CRYPTO '88, pp. 27-35, 1990.
|
20 |
M. Pirretti, P. Traynor, P. McDaniel, and B. Waters, "Secure attribute-based systems.", Proceedings of the 13th ACM conference on Computer and communications security, pp. 99-112, 2006.
|
21 |
T. Granlund, GNU MP: The GNU Multiple Precision Arithmetic Library, The Free Software Foundation, 2013.
|