, Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions. In Crypto'05, 2005.
Generalized Key Delegation for Hierarchical Identity-Based Encryption, ESORICS'07, 2007. ,
DOI : 10.1007/978-3-540-74835-9_10
URL : https://hal.archives-ouvertes.fr/hal-00918551
Converting Cryptographic Schemes from Symmetric to Asymmetric Bilinear Groups, Crypto 2014, 2014. ,
DOI : 10.1007/978-3-662-44371-2_14
Attribute-based encryption schemes with constant-size ciphertexts, Theoretical Computer Science, vol.422, 2012. ,
DOI : 10.1016/j.tcs.2011.12.004
URL : https://hal.archives-ouvertes.fr/hal-00763158
Functional encryption for inner product: Achieving constant-size ciphertexts with adaptive security or support for negation, PKC 2010, 2010. ,
Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts, PKC 2011, 2011. ,
DOI : 10.1007/978-3-642-19379-8_6
Dual System Encryption via Doubly Selective Security: Framework, Fully Secure Functional Encryption for Regular Languages, and More, Eurocrypt'14, 2014. ,
DOI : 10.1007/978-3-642-55220-5_31
Random oracles are practical, Proceedings of the 1st ACM conference on Computer and communications security , CCS '93, 1993. ,
DOI : 10.1145/168588.168596
Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles, Eurocrypt'04, pp.223-238, 2004. ,
DOI : 10.1007/978-3-540-24676-3_14
Hierarchical Identity Based Encryption with Constant Size Ciphertext, Eurocrypt'05, 2005. ,
DOI : 10.1007/11426639_26
Public Key Encryption with Keyword Search, Eurocrypt'04, 2004. ,
DOI : 10.1007/978-3-540-24676-3_30
Identity-Based Encryption from the Weil Pairing, Crypto'01, pp.586-615, 2001. ,
DOI : 10.1137/S0097539701398521
Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits, Eurocrypt 2014, 2014. ,
DOI : 10.1007/978-3-642-55220-5_30
Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys, Crypto'05, 2005. ,
DOI : 10.1007/11535218_16
Generalized Identity Based and Broadcast Encryption Schemes, Asiacrypt'08, 2008. ,
DOI : 10.1007/3-540-36178-2_33
Functional Encryption: Definitions and Challenges, TCC'11, 2011. ,
DOI : 10.1007/978-3-642-19571-6_16
Low-overhead Broadcast Encryption from Multi-Linear Maps, Crypto'14, 2014. ,
Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles), Crypto'06, 2006. ,
DOI : 10.1007/11818175_17
A Forward-Secure Public-Key Encryption Scheme, Eurocrypt'03, 2003. ,
Tightly Secure IBE Under Constant-Size Master Public Key, PKC (1) 2017, 2017. ,
DOI : 10.1007/978-3-662-49099-0_9
URL : https://hal.archives-ouvertes.fr/hal-01643457
Non-zero Inner Product Encryption with Short Ciphertexts and Private Keys, SCN 2016, pp.23-41, 2016. ,
DOI : 10.1007/978-3-642-54631-0_16
URL : https://hal.archives-ouvertes.fr/hal-01309562
Semi-adaptive Attribute-Based Encryption and Improved Delegation for Boolean Formula, SCN 2014, 2014. ,
DOI : 10.1007/978-3-319-10879-7_16
URL : https://eprint.iacr.org/2014/465.pdf
D??j?? Q: Using Dual Systems to Revisit q-Type Assumptions, Eurocrypt 2014, 2014. ,
DOI : 10.1007/978-3-642-55220-5_34
URL : http://cseweb.ucsd.edu/~smeiklejohn/files/eurocrypt14a.pdf
D??j?? Q All Over Again: Tighter and Broader Reductions of q-Type Assumptions, Asiacrypt (2) 2016, 2016. ,
DOI : 10.1007/978-3-662-49099-0_9
URL : http://discovery.ucl.ac.uk/1536451/1/Meiklejohn_further-q.pdf
Security Analysis of the Strong Diffie-Hellman Problem, Eurocrypt'06, 2006. ,
DOI : 10.1007/BFb0054891
URL : http://www.iacr.org/cryptodb/archive/2006/EUROCRYPT/2143/2143.pdf
Cryptanalysis of the Multilinear Map over the Integers, Eurocrypt'15, 2015. ,
DOI : 10.1007/978-3-662-46800-5_1
URL : https://hal.archives-ouvertes.fr/hal-01240445
Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys, Asiacrypt 2007, 2007. ,
DOI : 10.1007/978-3-540-76900-2_12
Dynamic Threshold Public-Key Encryption, Crypto 2008, 2007. ,
DOI : 10.1007/978-3-540-85174-5_18
Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange, Eurocrypt 2018, 2018. ,
DOI : 10.1007/978-3-319-45741-3_16
Broadcast Encryption, Crypto'93, 1993. ,
DOI : 10.1007/3-540-48329-2_40
Converting Pairing-Based Cryptosystems from Composite-Order Groups to Prime-Order Groups, Eurocrypt'10, 2010. ,
DOI : 10.1007/978-3-642-13190-5_3
URL : https://link.springer.com/content/pdf/10.1007%2F978-3-642-13190-5_3.pdf
Communication Complexity of Conditional Disclosure of Secrets and Attribute-Based Encryption, Crypto'15, 2015. ,
DOI : 10.1007/978-3-662-48000-7_24
URL : https://hal.archives-ouvertes.fr/hal-01220355
Candidate Indistinguishability Obfuscation and Functional Encryption for all Circuits, FOCS, vol.2013, 2013. ,
DOI : 10.1137/14095772x
URL : https://eprint.iacr.org/2013/451.pdf
Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts), Euro- crypt'09, 2009. ,
DOI : 10.1007/978-3-540-30598-9_15
Attribute-Based Encryption for Circuits from LWE, 2013. ,
Attribute-based encryption for fine-grained access control of encrypted data, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, 2006. ,
DOI : 10.1145/1180405.1180418
URL : http://www.cs.ucla.edu/~sahai/work/web/2006 Publications/ACM_CCS2006.pdf
Constant Size Ciphertexts in Threshold Attribute-Based Encryption, PKC'10, 2010. ,
DOI : 10.1007/978-3-642-13013-7_2
URL : https://hal.archives-ouvertes.fr/hal-01083535
Attribute-Based Encryption with Fast Decryption, PKC 2013, 2013. ,
DOI : 10.1007/978-3-642-36362-7_11
URL : http://eprint.iacr.org/2013/265.pdf
Introduction to Modern Cryptography, Second Edition, 2008. ,
Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products, Eurocrypt'08, 2008. ,
DOI : 10.1007/s00145-012-9119-4
URL : http://www.cs.umd.edu/~jkatz/papers/ec08.pdf
Revocation Systems with Very Small Private Keys, 2010 IEEE Symposium on Security and Privacy, 2010. ,
DOI : 10.1109/SP.2010.23
URL : http://eprint.iacr.org/2008/309.pdf
Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption, Eurocrypt 2010, 2010. ,
DOI : 10.1007/978-3-642-13190-5_4
URL : http://eprint.iacr.org/2010/110.pdf
New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts, TCC 2010, 2010. ,
DOI : 10.1007/978-3-540-78967-3_9
URL : https://link.springer.com/content/pdf/10.1007%2F978-3-642-11799-2_27.pdf
Revocation and Tracing Schemes for Stateless Receivers, Crypto 2001, 2001. ,
DOI : 10.1007/3-540-44647-8_3
URL : http://www.iacr.org/archive/crypto2001/21390040.pdf
Efficient Trace and Revoke Schemes, In Financial Cryptography LNCS, 1962. ,
DOI : 10.1007/3-540-45472-1_1
Accumulators from Bilinear Pairings and Applications, CT-RSA'05, 2005. ,
DOI : 10.1007/978-3-540-30574-3_19
Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption, Crypto'10, 2010. ,
DOI : 10.1007/978-3-642-14623-7_11
URL : https://eprint.iacr.org/2010/563.pdf
Achieving short ciphertexts or short secret-keys for adaptively secure general innerproduct encryption, CANS 2011, 2011. ,
DOI : 10.1007/s10623-015-0131-1
URL : https://link.springer.com/content/pdf/10.1007%2Fs10623-015-0131-1.pdf
Fully Secure Unbounded Inner-Product and Attribute-Based Encryption, Asi- acrypt'12, 2012. ,
DOI : 10.1007/978-3-642-34961-4_22
URL : https://link.springer.com/content/pdf/10.1007%2F978-3-642-34961-4_22.pdf
Achieving short ciphertexts or short secret-keys for adaptively secure general innerproduct encryption. Designs, Codes and Cryptography 77, pp.2-3, 2015. ,
DOI : 10.1007/s10623-015-0131-1
URL : https://link.springer.com/content/pdf/10.1007%2Fs10623-015-0131-1.pdf
Attribute-based encryption with non-monotonic access structures, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, 2007. ,
DOI : 10.1145/1315245.1315270
URL : http://www.cs.ucla.edu/~rafail/PUBLIC/88.pdf
Practical constructions and new proof methods for large universe attribute-based encryption, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, 2013. ,
DOI : 10.1145/2508859.2516672
Identity-Based Broadcast Encryption, Cryptology ePrint Archive, 2007. ,
ID-based Cryptosystems with Pairing on Elliptic Curve, Cryptology ePrint Archive, p.54, 2003. ,
Fuzzy Identity-Based Encryption, Eurocrypt'05, 2005. ,
DOI : 10.1007/11426639_27
Identity-Based Cryptosystems and Signature Schemes, Crypto'84, 1984. ,
DOI : 10.1007/3-540-39568-7_5
URL : https://link.springer.com/content/pdf/10.1007%2F3-540-39568-7_5.pdf
Expressive Attribute-Based Encryption with Constant-Size Ciphertexts from the Decisional Linear Assumption, SCN 2014, 2014. ,
DOI : 10.1007/978-3-319-10879-7_17
URL : http://eprint.iacr.org/2014/207.pdf
New Proof Techniques for DLIN-Based Adaptively Secure Attribute-Based Encryption, ACISP 2017, 2017. ,
DOI : 10.1007/978-3-642-19379-8_4
Efficient Identity-Based Encryption Without Random Oracles, Eurocrypt 2005, 2005. ,
DOI : 10.1007/11426639_7
URL : http://libeccio.dia.unisa.it/CRYPTO07/Papers/Waters.pdf
Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions, Crypto 2009, 2009. ,
DOI : 10.1007/978-3-642-03356-8_36
URL : https://link.springer.com/content/pdf/10.1007%2F978-3-642-03356-8_36.pdf