Publisher
Springer Science and Business Media LLC
Subject
Applied Mathematics,Computer Science Applications
Reference32 articles.
1. Abe M., Camenisch J., Dubovitskaya M., Nishimaki R.: Universally composable adaptive oblivious transfer (with access control) from standard assumptions. In: Proceedings of the 2013 ACM Workshop on Digital Identity Management, pp. 1–12. ACM, Berlin (2013).
2. Au M.H., Susilo W., Mu Y.: Constant-size dynamic k-taa. In: Prisco R.D., Yung, M. (eds.) SCN. Lecture Notes in Computer Science, vol. 4116, pp. 111–125. Springer, Heidelberg (2006).
3. Bethencourt J., Sahai A., Waters B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, pp. 321–334. IEEE Computer Society, Washington, DC (2007).
4. Camenisch J., Stadler M.: Proof systems for general statements about discrete logarithms. Technical Report TR 260. Institute for Theoretical Computer Science, ETH Zürich (1997).
5. Camenisch J., Dubovitskaya M., Enderlein R.R., Neven G.: Oblivious transfer with hidden access control from attribute-based encryption. In: Visconti I., Prisco R.D. (eds.) SCN. Lecture Notes in Computer Science, vol. 7485, pp. 559–579. Springer, Berlin (2012).
Cited by
12 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献