References
- Shamir A., "Identity-based cryptosystems and signature schemes", Proceedings of CRYPTO 84 on Advances in cryptology, pp.47-53, Springer Verlag, 1985.
- Boneh D. and Franklin M., "Identity-Based Encryption from the Weil Pairing", SIAM Journal of Computing, vol 32, no 3, pp. 586-615, 2003. https://doi.org/10.1137/S0097539701398521
- Gentry C., "Practical identity-based encryption without random oracle", Proceedings of the 24th annual international conference on The Theory and Applications of Cryptographic Techniques, pp. 445-464, St. Petersburg, Russia, 2006.
- Sahai A. and Waters B., "Fuzzy identity-based encryption". EUROCRYPT, Lecture Notes in Computer Science, Vol. 3949, pp. 457-473, Springer, 2005.
- Baek J., Susilo W. and Zhou J., "New constructions of fuzzy identity based encryption". In Proceedings of the 2nd ACM symposium on information, computer, and communications security, pp. 369-370, 2007.
- Katz J., Sahai A. and Waters B., "Predicate encryption supporting disjunctions, polynomial equations, and inner products", Proceedings of the theory and applications of cryptographic techniques 27th annual international conference on Advances in cryptology, Istanbul, Turkey, pp. 146-162, 2008.
- Okamoto, T. and Takahima, K., "Adaptively-Hiding (Hierarchical) Inner Product Encryption", Advances in Cryptology EUROCRYPT 2012-LNCS, vol. 7273, 2012.
- Bethencourt, J., Sahai, A., Waters, B., "Ciphertext-Policy Attribute-Based Encryption," IEEE Symposium on Security and Privacy, pp. 321-334, 2007.
- Goyal V., Pandey O., and Sahai A., "Attribute-based encryption for fine-grained access control of encrypted data", Proceedings of the 13th ACM conference on Computer and communications security, pp. 89-98, 2006.
- Lewko, A., Okamoto, T., Sahai, A., Takashima, K., and Waters, B., "Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption", Advances in Cryptology - EUROCRYPT 2010 LNCS, vol. 6110, pp. 62-91, 2010.
- Li F., Khan M. K., "A biometric identity-based signcryption scheme", Future Generation Computer Systems, vol. 28, no. 1, pp. 306-310, 2012. https://doi.org/10.1016/j.future.2010.11.004
- Dijiang H., and Mayank V., ASPE: attributebased secure policy enforcement in vehicular ad hoc networks, Ad Hoc Networks, vol. 7, no. 8, pp. 1526-1535, 2009. https://doi.org/10.1016/j.adhoc.2009.04.011
- Guojun W., Qin L., Jie W., and Minyi G, Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers, Computers & Security, vol. 30, no. 5, pp. 320-331, 2011. https://doi.org/10.1016/j.cose.2011.05.006
- Boneh D., Sahai A., and Waters B., "Functional encryption: definition and challenges", Theory of Cryptography Lecture Notes in Computer Science, vol. 6597, pp. 253-273, 2011.
- Canetti, R., "Universally composable security: a new paradigm for cryptographic protocols," Foundations of Computer Science, Proceedings. 42nd IEEE Symposium on , pp. 136-145, 2001.
- Canetti, Ran and Krawczyk, Hugo, "Universally Composable Notions of Key Exchange and Secure Channels", Advances in Cryptology - EUROCRYPT 2002 LNCS, vol. 2332, pp. 337-351, 2002.
- Nishimaki R., Manabe Y., and Okamoto T., "Universally composable identity-based encryption", IEICE Trans. Fundamental Communication Computer Science, vol. E91-A, no. 1, pp. 262-271, 2008. https://doi.org/10.1093/ietfec/e91-a.1.262
Cited by
- Secure Attribute-Based Access Control with a Ciphertext-Policy Attribute-Based Encryption Scheme vol.19, pp.1, 2014, https://doi.org/10.9723/jksiis.2014.19.1.001