Lista articole Articole ABC Cryptography

download Lista articole Articole ABC Cryptography

of 3

Transcript of Lista articole Articole ABC Cryptography

  • 7/25/2019 Lista articole Articole ABC Cryptography

    1/3

    R.Terciu

    Merel Koning , Paulan Korenhof , Gergely Alpr, and Jaap-Henk Hoepman -The ABC of ABC -

    An Analyi of A!!ri"u!e-Baed Creden!ial in !he #igh! of $a!a Pro!e%!ion, Pri&a%y and 'den!i!y

    (e pare %a a!ia au de)a un produ pe pia!a, de !udia! mai in de!aliu * foloe% a%%eul pe "a+a

    de a!ri"u!e in "a+a unui engine de &erifi%a! a!ri"u!ele din!r-o poli!i%a %ria in ACM# - nu %red

    %a foloe% %rip!are "a+a!a pe a!ri"u!e.

    h!!p/00111.a2ioma!i%.%om0a!!ri"u!e-"aed-a%%e-%on!rol.h!ml

    3u!!apong A!!rapadung4 , Beno56! #i"er!78 , and 9lie de Panafieu: - 92prei&e Key-Poli%y

    A!!ri"u!e-Baed 9n%ryp!ion 1i!h Con!an!-(i+e Cipher!e2!

    Cipher!e2! poli%y A!!ri"u!e "aed 9n%ryp!ion 1i!h anonymou a%%e poli%y A.Balu4 ,

    K.Kuppuamy7

    #ink-ul %a!re !ool-ul CPAB9- h!!p/00hm.ii.)hu.edu0a%%0%pa"e0inde2.h!ml

    Prere;uii!e/ ap!-ge! in!all li"l-de&

    PBC -h!!p/00%ryp!o.!anford.edu0p"%0manual0%h?@:01ha!-i-a!!ri"u!e-"aed-

    en%ryp!ion04>?@4>?@8ne1regdd4

  • 7/25/2019 Lista articole Articole ABC Cryptography

    2/3

    M.Togan

    A. Sahai, B. Waters. (printre primele scheme de criptare bazata pe

    atribute)Fuzzy identity-based encryption, in roc. o! the "#$%&$', pp. *+-

    +, *.

    /. irretti, . raynor, . /c0aniel, B. Waters.

    Secure attribute-based systems. 1n roc o! the 2th A&/ con!erence

    on &omputer and communications security, pp 33-22. A&/ ress 4e5

    'or6, #SA, 7.

    8. 9oyal, %. andey, A. Sahai, and B. Waters.

    Attribute-Based "ncryption !or Fine-:rained Access &ontrol o!

    "ncrypted 0ata. 1n roc. o! 2th A&/ &on!. &omputer and

    communications security (&&S ;7), pp.

  • 7/25/2019 Lista articole Articole ABC Cryptography

    3/3

    AttributeSetsG A ractically /oti?ated "nhancement to Attribute-Based

    "ncryption, =uly +, 3

    $. %stro?s6y, B. Waters.

    Attribute based encryption 5ith nonmonotonic access structures. 1n

    roc. o! the 2th A&/ con!erence on &omputer and communicationssecurity, pp. 23*-, A&/ 4e5 'or6, #SA, +.

    9. Wan:, H. iu, =.Wu,

    ierachical attibute- based encryption !or !ine-:rained access

    control in cloud stora:e ser?ices,I in roc. o! the 2+th A&/

    con!erence on &omputer and communications security, 2

    9.Wan:, H. iu, =.Wu, /. 9uo,

    Iierarchical attribute-based encryption and scalable user re?ocation

    !or sharin: data in cloud ser?ersI &omputer J Security, ?ol. , pp.

    -2, 22.

    /. &hase, S. S. &ho5.

    1mpro?in: pri?acy and security in multi-authority attribute-based

    encryption in roc. o! &omputer and communications security (&&S

    ;3), pp. 222, 3.

    8 Bozo?ic, 0 Soce6, $ Stein5andt, 8. 1. 8il-lanyi.

    /ultiauthority attribute-based encryption 5ith honest-but-curious

    central authorityI. 1nternational =ournal o! &omputer /athematics,

    8olume.