Generic Transformations of Predicate Encodings: Constructions and Applications, CRYPTO 2017, pp.36-66, 2017. ,
DOI : 10.1007/978-3-642-54242-8_26
A study of pair encodings: Predicate encryption in prime order groups, TCC 2016-A, Part II, pp.259-288, 2016. ,
Simplifying design and analysis of complex predicate encryption schemes A framework for identity-based encryption with almost tight security, Advances in Cryptology - EUROCRYPT 2017, Part I AHY15. Nuttapong Attrapadung, Goichiro Hanaoka, and Shota Yamada ASI- ACRYPT 2015, pp.627-656, 2015. ,
Functional encryption for inner product: Achieving constant-size ciphertexts with adaptive security or support for negation, PKC 2010, pp.384-402, 2010. ,
DOI : 10.1007/978-3-642-13013-7_23
Dual System Encryption via Doubly Selective Security: Framework, Fully Secure Functional Encryption for Regular Languages, and More, EUROCRYPT 2014, pp.557-577 ,
DOI : 10.1007/978-3-642-55220-5_31
Dual system encryption framework in primeorder groups via computational pair encodings, ASIACRYPT 2016, Part II, pp.591-623, 2016. ,
DOI : 10.1007/978-3-662-53890-6_20
Duality in ABE: Converting attribute based encryption for dual predicate and dual policy via computational encodings, CT-RSA 2015, pp.87-105 ,
DOI : 10.1007/978-3-319-16715-2_5
Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles, EUROCRYPT 2004, pp.223-238, 2004. ,
DOI : 10.1007/978-3-540-24676-3_14
Secure identity based encryption without random oracles, CRYPTO 2004, pp.443-459 ,
Hierarchical identity based encryption with constant size ciphertext, EUROCRYPT 2005, pp.440-456, 2004. ,
Identity-based encryption from the Weil pairing, CRYPTO 2001, pp.213-229 ,
DOI : 10.1137/s0097539701398521
URL : http://eprint.iacr.org/2001/090.ps.gz
(Hierarchical) identity-based encryption from affine message authentication Ciphertext-policy attribute-based encryption Functional encryption: Definitions and challenges, CRYPTO 2014, Part I IEEE Symposium on Security and Privacy BSW11. Dan Boneh, Amit Sahai, and Brent Waters TCC 2011, pp.408-425, 2001. ,
Improved Dual System ABE in Prime-Order Groups via Predicate Encodings, EUROCRYPT 2015, Part II, pp.595-624, 2015. ,
DOI : 10.1007/978-3-662-46803-6_20
URL : https://hal.archives-ouvertes.fr/hal-01220358
Tightly secure IBE under constant-size master public key A forward-secure public-key encryption scheme, Public-Key Cryptography -PKC 2017, Part I EUROCRYPT 2003, pp.207-231, 2003. ,
DOI : 10.1007/978-3-662-54365-8_9
Semi-adaptive Attribute-Based Encryption and Improved Delegation for Boolean Formula, SCN 14, pp.277-297, 2014. ,
DOI : 10.1007/978-3-319-10879-7_16
URL : https://eprint.iacr.org/2014/465.pdf
An algebraic framework for Diffie-Hellman assumptions, CRYPTO 2013, pp.129-147, 2013. ,
DOI : 10.1007/978-3-642-40084-1_8
URL : http://eprint.iacr.org/2013/377.pdf
Efficient IBE with Tight Reduction to Standard Assumption in the Multi-challenge Setting, ASIACRYPT 2016, Part II, pp.624-654 ,
DOI : 10.1007/978-3-642-54242-8_26
Practical Identity-Based Encryption Without Random Oracles, LNCS, vol.32, issue.3, pp.445-464, 2006. ,
DOI : 10.1007/11426639_7
URL : http://www.iacr.org/cryptodb/archive/2006/EUROCRYPT/2330/2330.pdf
Tightly CCAsecure encryption without pairings, EUROCRYPT 2016, Part I, pp.1-27, 2016. ,
DOI : 10.1007/978-3-662-49890-3_1
URL : https://hal.archives-ouvertes.fr/hal-01302516
Semi-adaptive Security and Bundling Functionalities Made Generic and Easy, TCC 2016-B, Part II, pp.361-388, 2016. ,
DOI : 10.1109/SFCS.1986.25
Attributebased encryption for fine-grained access control of encrypted data Shorter quasi-adaptive NIZK proofs for linear subspaces, ACM CCS 06 ASIACRYPT 2013, pp.89-98, 2006. ,
An Efficient KP-ABE with Short Ciphertexts in Prime OrderGroups under Standard Assumption, Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, ASIA CCS '17, pp.823-834, 2017. ,
DOI : 10.1109/TrustCom.2012.136
A Tag Based Encoding: An Efficient Encoding for Predicate Encryption in Prime Order Groups, SCN 16, pp.3-22, 2016. ,
DOI : 10.1007/978-3-642-54242-8_26
Predicate encryption supporting disjunctions, polynomial equations, and inner products, EURO- CRYPT 2008, pp.146-162, 2008. ,
DOI : 10.1007/s00145-012-9119-4
Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption, EURO- CRYPT 2010, pp.62-91, 2010. ,
New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts, TCC 2010, pp.455-479, 2010. ,
DOI : 10.1007/978-3-540-78967-3_9
URL : http://eprint.iacr.org/2009/482.pdf
New proof methods for attributebased encryption: Achieving full security through selective techniques Attribute-based encryption with non-monotonic access structures, CRYPTO 2012 OSW07. Rafail Ostrovsky, Amit Sahai, and Brent Waters ACM CCS 07, pp.180-198, 2007. ,
Fully secure functional encryption with general relations from the decisional linear assumption Adaptively attribute-hiding (hierarchical) inner product encryption, CRYPTO 2010 EUROCRYPT 2012, pp.191-208, 2010. ,
DOI : 10.1007/978-3-642-14623-7_11
URL : https://eprint.iacr.org/2010/563.pdf
More efficient constructions for inner-product encryption Sanjit Chatterjee, and Palash Sarkar. Variants of waters' dual system primitives using asymmetric pairings -(extended abstract) Efficient (anonymous) compact HIBE from standard assumptions, ACNS 16 PKC 2012 RS14. Somindu C. Ramanna and Palash Sarkar ProvSec 2014 RS16. Somindu C. Ramanna and Palash Sarkar, pp.231-248, 2012. ,
Identity-Based Cryptosystems and Signature Schemes, LNCS, vol.84, issue.196, pp.47-53, 1984. ,
DOI : 10.1007/3-540-39568-7_5
URL : https://link.springer.com/content/pdf/10.1007%2F3-540-39568-7_5.pdf
Fuzzy Identity-Based Encryption, EUROCRYPT 2005, pp.457-473, 2005. ,
DOI : 10.1007/11426639_27
Delegating Capabilities in Predicate Encryption Systems, Part II LNCS, vol.5126, pp.560-578, 2008. ,
DOI : 10.1007/978-3-540-70583-3_46
URL : http://eprint.iacr.org/2008/279.pdf
Efficient identity-based encryption without random oracles, EUROCRYPT 2005, pp.114-127 ,
Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions, CRYPTO 2009, pp.619-636, 2009. ,
DOI : 10.1007/978-3-642-03356-8_36
URL : http://eprint.iacr.org/2009/385.pdf
Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization, PKC 2011, pp.53-70, 2011. ,
DOI : 10.1007/978-3-642-19379-8_4
Dual System Encryption via Predicate Encodings, TCC 2014, pp.616-637, 2014. ,
DOI : 10.1007/978-3-642-54242-8_26
URL : https://hal.archives-ouvertes.fr/hal-01094703
New revocable IBE in prime-order groups: Adaptively secure, decryption key exposure resistant, and with short public parameters, TCC 2016-A, Part II Topics in Cryptology -CT-RSA 2017, pp.237-258, 2016. ,
Identity-based hierarchical keyinsulated encryption without random oracles, PKC 2016, Part I, pp.255-279, 2016. ,
DOI : 10.1007/978-3-662-49384-7_10