Author:
Kasamatsu Kohei,Matsuda Takahiro,Emura Keita,Attrapadung Nuttapong,Hanaoka Goichiro,Imai Hideki
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Safety, Risk, Reliability and Quality,Information Systems,Software
Reference39 articles.
1. Abdalla, M., Bellare, M., Catalano, D., Kiltz, E., Kohno, T., Lange, T., Malone-Lee, J., Neven, G., Paillier, P., Shi, H.: Searchable encryption revisited: consistency properties, relation to anonymous IBE, and extensions. J. Cryptol. 21(3), 350–391 (2008)
2. Anderson, R.J.: Two remarks on public key cryptology. invited lecture. In: ACM Conference on Computer and Communications Security (1997). http://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-549
3. Attrapadung, N., Imai, H.: Graph-decomposition-based frameworks for subset-cover broadcast encryption and efficient instantiations. In: ASIACRYPT, pp. 100–120 (2005)
4. Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, pp. 321–334 (2007)
5. Boneh, D., Boyen, X.: Efficient selective-ID secure identity-based encryption without random oracles. In: EUROCRYPT, pp. 223–238 (2004)
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Generic Construction of Forward Secure Public Key Authenticated Encryption with Keyword Search;Lecture Notes in Computer Science;2024
2. Wildcarded identity-based ring signatures based on linearly homomorphic signatures;Journal of Information Security and Applications;2023-06
3. i-TiRE;Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security;2022-11-07
4. Multi-dimensional sub/super-range signatures;Journal of Information Security and Applications;2022-03
5. CCA Secure A Posteriori Openable Encryption in the Standard Model;Topics in Cryptology – CT-RSA 2022;2022