Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts, PKC'11, pp.90-108, 2011. ,
DOI : 10.1007/978-3-642-19379-8_6
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.680.2516
Ciphertext-Policy Attribute-Based Encryption, 2007 IEEE Symposium on Security and Privacy (SP '07), pp.321-334, 2007. ,
DOI : 10.1109/SP.2007.11
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.69.3744
Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles, Euro- crypt'04, pp.223-238, 2004. ,
DOI : 10.1007/978-3-540-24676-3_14
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.5446
Hierarchical Identity Based Encryption with Constant Size Ciphertext, Euro- crypt'05, pp.440-456, 2005. ,
DOI : 10.1007/11426639_26
URL : http://ai.stanford.edu/~xb/eurocrypt05a/eurocrypt05tinyhibe.ps
Short Group Signatures, Crypto'04, pp.41-55, 2004. ,
DOI : 10.1007/978-3-540-28628-8_3
Mesh Signatures, Eurocrypt'07, pp.210-227, 2007. ,
DOI : 10.1007/978-3-540-72540-4_12
Threshold Ring Signatures and Applications to Ad-hoc Groups, Crypto'02, pp.465-480, 2002. ,
DOI : 10.1007/3-540-45708-9_30
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.107.8201
Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys, Crypto'05, pp.258-275, 2005. ,
DOI : 10.1007/11535218_16
Generalized Identity Based and Broadcast Encryption Schemes, Asiacrypt'08, pp.455-470, 2008. ,
DOI : 10.1007/3-540-36178-2_33
Some Ideal Secret Sharing Schemes, In Journal of Combinatorial Mathematics and Combinatorial Computing, vol.9, pp.105-113, 1989. ,
DOI : 10.1007/3-540-46885-4_45
Extended access structures and their cryptographic applications, Applicable Algebra in Engineering, Communication and Computing, pp.257-284, 2010. ,
Dynamic Threshold Public-Key Encryption, Crypto'08, pp.317-334, 2008. ,
DOI : 10.1007/978-3-540-85174-5_18
A ciphertext-policy attribute-based encryption scheme with constant ciphertext length, ISPEC '09, pp.13-23, 2009. ,
Revocable Attribute-Based Signatures with Adaptive Security in the Standard Model, Africacrypy'11, pp.224-241, 2011. ,
DOI : 10.1007/11426639_7
How To Prove Yourself: Practical Solutions to Identification and Signature Problems, Crypto'86, pp.186-194, 1986. ,
DOI : 10.1007/3-540-47721-7_12
Attribute-based encryption for fine-grained access control of encrypted data, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, pp.89-98, 2006. ,
DOI : 10.1145/1180405.1180418
Efficient Non-interactive Proof Systems for Bilinear Groups, Eurocrypt'08, pp.415-432, 2008. ,
DOI : 10.1007/978-3-540-78967-3_24
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.304.8523
Constant Size Ciphertexts in Threshold Attribute-Based Encryption, PKC'10, pp.19-34, 2010. ,
DOI : 10.1007/978-3-642-13013-7_2
URL : https://hal.archives-ouvertes.fr/hal-01083535
Programmable hash functions and their applications, Crypto'08, pp.21-38, 2008. ,
DOI : 10.1007/s00145-011-9102-5
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.400.7292
Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption, Eurocrypt'10, pp.62-91, 2010. ,
DOI : 10.1007/978-3-642-13190-5_4
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.165.2844
Attribute-based signature and its applications, Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS '10, pp.60-69, 2010. ,
DOI : 10.1145/1755688.1755697
URL : http://ro.uow.edu.au/cgi/viewcontent.cgi?article=8730&context=era
Hidden attribute-based signatures without anonymity revocation, Information Sciences, pp.1681-1689, 2010. ,
DOI : 10.1016/j.ins.2010.01.008
Signatures Resilient to Continual Leakage on Memory and Computation, TCC'11, pp.89-106, 2011. ,
DOI : 10.1007/978-3-642-19571-6_7
Attribute-Based Signatures, CT-RSA'11, pp.376-392, 2011. ,
DOI : 10.1007/11426639_7
On Cryptographic Assumptions and Challenges, Crypto'03, pp.96-109, 2003. ,
DOI : 10.1007/978-3-540-45146-4_6
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.330.9911
Homomorphic Encryption and Signatures from Vector Decomposition, Pair- ing'08, pp.57-74, 2008. ,
DOI : 10.1007/978-3-540-85538-5_4
Efficient attribute-based signatures for non-monotone predicates in the standard model, PKC'11, pp.35-52, 2011. ,
How to Leak a Secret, Asiacrypt'01, pp.552-565, 2001. ,
DOI : 10.1007/3-540-45682-1_32
Fuzzy Identity-Based Encryption, Eurocrypt'05, pp.457-473, 2005. ,
DOI : 10.1007/11426639_27
Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems, Africacrypt'09, pp.198-216, 2009. ,
DOI : 10.1007/11426639_7
Hierarchical Threshold Secret Sharing, Journal of Cryptology, vol.20, issue.2, pp.237-264, 2007. ,
DOI : 10.1007/s00145-006-0334-8
Efficient Identity-Based Encryption Without Random Oracles, Eurocrypt'05, pp.114-127, 2005. ,
DOI : 10.1007/11426639_7