Author:
Routray Kasturi,Sethi Kamalakanta,Mishra Bharati,Bera Padmalochan,Jena Debasish
Reference12 articles.
1. Beimel, A.: Secure schemes for secret sharing and key distribution, Ph.D. dissertation, Faculty Computer. Sci., Technion-Israel Inst. Technol., Haifa, Israel (1996)
2. Seo, J.H., Cheon, J.H.: Beyond the limitation of prime-order bilinear groups, and round optimal blind signatures. In: Theory of Cryptography Conference, Berlin, Springer, LNCS, vol. 7194, pp. 133–150 (2012)
3. Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Proceedings of the Advances in Cryptology-EUROCRYPT, vol. 3494, pp. 457–473, LNCS (2005)
4. Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attibute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the ACM Conference Computer and Communications Security (ACM CCS), pp. 89–98, Virginia, USA (2006)
5. Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: Proceedings of the IEEE Symposium Security and Privacy, Oakland, CA (2007)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献