Lista articole Articole ABC Cryptography
-
Upload
radu-terciu -
Category
Documents
-
view
218 -
download
0
Transcript of Lista articole Articole ABC Cryptography
-
7/25/2019 Lista articole Articole ABC Cryptography
1/3
R.Terciu
Merel Koning , Paulan Korenhof , Gergely Alpr, and Jaap-Henk Hoepman -The ABC of ABC -
An Analyi of A!!ri"u!e-Baed Creden!ial in !he #igh! of $a!a Pro!e%!ion, Pri&a%y and 'den!i!y
(e pare %a a!ia au de)a un produ pe pia!a, de !udia! mai in de!aliu * foloe% a%%eul pe "a+a
de a!ri"u!e in "a+a unui engine de &erifi%a! a!ri"u!ele din!r-o poli!i%a %ria in ACM# - nu %red
%a foloe% %rip!are "a+a!a pe a!ri"u!e.
h!!p/00111.a2ioma!i%.%om0a!!ri"u!e-"aed-a%%e-%on!rol.h!ml
3u!!apong A!!rapadung4 , Beno56! #i"er!78 , and 9lie de Panafieu: - 92prei&e Key-Poli%y
A!!ri"u!e-Baed 9n%ryp!ion 1i!h Con!an!-(i+e Cipher!e2!
Cipher!e2! poli%y A!!ri"u!e "aed 9n%ryp!ion 1i!h anonymou a%%e poli%y A.Balu4 ,
K.Kuppuamy7
#ink-ul %a!re !ool-ul CPAB9- h!!p/00hm.ii.)hu.edu0a%%0%pa"e0inde2.h!ml
Prere;uii!e/ ap!-ge! in!all li"l-de&
PBC -h!!p/00%ryp!o.!anford.edu0p"%0manual0%h?@:01ha!-i-a!!ri"u!e-"aed-
en%ryp!ion04>?@4>?@8ne1regdd4
-
7/25/2019 Lista articole Articole ABC Cryptography
2/3
M.Togan
A. Sahai, B. Waters. (printre primele scheme de criptare bazata pe
atribute)Fuzzy identity-based encryption, in roc. o! the "#$%&$', pp. *+-
+, *.
/. irretti, . raynor, . /c0aniel, B. Waters.
Secure attribute-based systems. 1n roc o! the 2th A&/ con!erence
on &omputer and communications security, pp 33-22. A&/ ress 4e5
'or6, #SA, 7.
8. 9oyal, %. andey, A. Sahai, and B. Waters.
Attribute-Based "ncryption !or Fine-:rained Access &ontrol o!
"ncrypted 0ata. 1n roc. o! 2th A&/ &on!. &omputer and
communications security (&&S ;7), pp.
-
7/25/2019 Lista articole Articole ABC Cryptography
3/3
AttributeSetsG A ractically /oti?ated "nhancement to Attribute-Based
"ncryption, =uly +, 3
$. %stro?s6y, B. Waters.
Attribute based encryption 5ith nonmonotonic access structures. 1n
roc. o! the 2th A&/ con!erence on &omputer and communicationssecurity, pp. 23*-, A&/ 4e5 'or6, #SA, +.
9. Wan:, H. iu, =.Wu,
ierachical attibute- based encryption !or !ine-:rained access
control in cloud stora:e ser?ices,I in roc. o! the 2+th A&/
con!erence on &omputer and communications security, 2
9.Wan:, H. iu, =.Wu, /. 9uo,
Iierarchical attribute-based encryption and scalable user re?ocation
!or sharin: data in cloud ser?ersI &omputer J Security, ?ol. , pp.
-2, 22.
/. &hase, S. S. &ho5.
1mpro?in: pri?acy and security in multi-authority attribute-based
encryption in roc. o! &omputer and communications security (&&S
;3), pp. 222, 3.
8 Bozo?ic, 0 Soce6, $ Stein5andt, 8. 1. 8il-lanyi.
/ultiauthority attribute-based encryption 5ith honest-but-curious
central authorityI. 1nternational =ournal o! &omputer /athematics,
8olume.