Generalized Key Delegation for Hierarchical Identity-Based Encryption, ESORICS'07, pp.139-154, 2007. ,
DOI : 10.1007/978-3-540-74835-9_10
URL : https://hal.archives-ouvertes.fr/hal-00918551
Escrow-free encryption supporting cryptographic workflow, International Journal of Information Security, vol.22, issue.4, pp.217-229, 2006. ,
DOI : 10.1007/s10207-006-0002-x
Dual-Policy Attribute Based Encryption, ACNS'09, pp.168-185, 2009. ,
DOI : 10.1007/978-3-642-01957-9_11
Conjunctive Broadcast and Attribute-Based Encryption, Pairing'09, pp.248-265, 2009. ,
DOI : 10.1007/11426639_27
Functional Encryption for Inner Product: Achieving Constant-Size Ciphertexts with Adaptive Security or Support for Negation, PKC'10, pp.384-402, 2010. ,
Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts, PKC'11, pp.90-108, 2011. ,
DOI : 10.1007/978-3-642-19379-8_6
Ciphertext-Policy Attribute-Based Encryption, 2007 IEEE Symposium on Security and Privacy (SP '07), pp.321-334, 2007. ,
DOI : 10.1109/SP.2007.11
Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles, Eurocrypt'04, pp.223-238, 2004. ,
DOI : 10.1007/978-3-540-24676-3_14
Hierarchical Identity Based Encryption with Constant Size Ciphertext, Eurocrypt'05, pp.440-456, 2005. ,
DOI : 10.1007/11426639_26
Short Group Signatures, Crypto'04, pp.41-55, 2004. ,
DOI : 10.1007/978-3-540-28628-8_3
Identity-Based Encryption from the Weil Pairing, Earlier version in Crypto'01, pp.586-615, 2001. ,
DOI : 10.1137/S0097539701398521
Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys, Crypto'05, pp.258-275, 2005. ,
DOI : 10.1007/11535218_16
Generalized Identity Based and Broadcast Encryption Schemes, Asiacrypt'08, pp.455-470, 2008. ,
DOI : 10.1007/3-540-36178-2_33
Functional Encryption: Definitions and Challenges, TCC'11, pp.253-273, 2011. ,
DOI : 10.1007/978-3-642-19571-6_16
General Ad Hoc Encryption from Exponent Inversion IBE, Eurocrypt'07, pp.394-411, 2007. ,
DOI : 10.1007/978-3-540-72540-4_23
An Efficient threshold Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack (Extended Abstract), Eurocrypt'99, pp.90-106, 1999. ,
DOI : 10.1007/3-540-48910-X_7
A Forward-Secure Public-Key Encryption Scheme, Eurocrypt'03, pp.254-271, 2003. ,
Chosen-Ciphertext Security from Identity-Based Encryption, Eurocrypt'04, pp.207-222, 2004. ,
DOI : 10.1007/978-3-540-24676-3_13
Efficient ID-based Broadcast Threshold Decryption in Ad Hoc Network, First International Multi-Symposiums on Computer and Computational Sciences (IMSCCS'06), pp.148-154, 2006. ,
DOI : 10.1109/IMSCCS.2006.217
Multi-authority Attribute Based Encryption, TCC'07, pp.515-534, 2007. ,
DOI : 10.1007/978-3-540-70936-7_28
Improving privacy and security in multi-authority attribute-based encryption, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, pp.121-130, 2009. ,
DOI : 10.1145/1653662.1653678
Security Analysis of the Strong Diffie-Hellman Problem, Eurocrypt'06, pp.1-11, 2006. ,
DOI : 10.1007/11761679_1
Provably secure ciphertext policy ABE, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, pp.456-465, 2007. ,
DOI : 10.1145/1315245.1315302
CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts, ProvSec'07, pp.35-50, 2007. ,
DOI : 10.1007/978-3-540-75670-5_3
Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size Ciphertexts or Decryption Keys, Pairing'07, pp.39-59, 2007. ,
DOI : 10.1007/978-3-540-73489-5_4
Dynamic Threshold Public-Key Encryption, Crypto'08, pp.317-334, 2008. ,
DOI : 10.1007/978-3-540-85174-5_18
A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length, ISPEC '09, pp.13-23, 2009. ,
Attribute-based encryption for fine-grained access control of encrypted data, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, pp.89-98, 2006. ,
DOI : 10.1145/1180405.1180418
Bounded Ciphertext Policy Attribute Based Encryption, ICALP LNCS, vol.5126, issue.2, pp.579-591, 2008. ,
DOI : 10.1007/978-3-540-70583-3_47
Constant Size Ciphertexts in Threshold Attribute-Based Encryption, PKC'10, 2010. ,
DOI : 10.1007/978-3-642-13013-7_2
URL : https://hal.archives-ouvertes.fr/hal-01083535
Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products, Eurocrypt'08, pp.146-162, 2008. ,
Revocation Systems with Very Small Private Keys, 2010 IEEE Symposium on Security and Privacy, 2010. ,
DOI : 10.1109/SP.2010.23
Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption, Eurocrypt'10, pp.62-91, 2010. ,
DOI : 10.1007/978-3-642-13190-5_4
On Cryptographic Assumptions and Challenges, Crypto'03, pp.96-109, 2003. ,
DOI : 10.1007/978-3-540-45146-4_6
Efficient Trace and Revoke Schemes, In Financial Cryptography LNCS, pp.1-20, 1962. ,
Attribute-based encryption with non-monotonic access structures, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, pp.195-203, 2007. ,
DOI : 10.1145/1315245.1315270
ID-based Cryptosystems with Pairing on Elliptic Curve. Cryptology ePrint Archive, Report, p.54, 2003. ,
Fuzzy Identity-Based Encryption, Eurocrypt'05, pp.457-473, 2005. ,
DOI : 10.1007/11426639_27
How to share a secret, Communications of the ACM, vol.22, issue.11, pp.612-613, 1979. ,
DOI : 10.1145/359168.359176
Identity-Based Cryptosystems and Signature Schemes, Crypto'84, pp.47-53, 1984. ,
DOI : 10.1007/3-540-39568-7_5
Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption, Crypto'10, pp.191-208, 2010. ,
DOI : 10.1007/978-3-642-14623-7_11
Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization, PKC 2011, pp.53-70, 2011. ,
DOI : 10.1007/978-3-642-19379-8_4
Generic Constructions for Chosen-Ciphertext Secure Attribute Based Encryption, PKC 2011, pp.71-89, 2011. ,
DOI : 10.1007/978-3-642-19379-8_5