Bibliography on Attribute Based Encryption    

 

 

Maintained by
Xiaohui Liang


Department of Electrical and Computer Engineering

University of Waterloo
,

Waterloo, Ontario, Canada

Acknowledgements: Many thanks to Xiaodong Lin, Rongxing Lu and Huang Lin for their valuable contributions to this site.


WWW    


  Bibliography on Attribute Based Encryption
[ 2009 -- Beyond | 2008 | 2007 | 2006 | 2005 -- Before]

 


  • [HV09] Dijiang Huang and Mayank Verma, ASPE: attribute-based secure policy enforcement in vehicular ad hoc networks, Ad Hoc Networks, vol 7, no 8, pg 1526--1535, 2009.
  • [LCLS09] Xiaohui Liang , Zhenfu Cao, Huang Lin and Jun Shao, Attribute Based Proxy Re-encryption with Delegating Capabilities, ASIACCS 2009 , Sydney, Australia, 10-12 March 2009.
  • [LCLX09] Xiaohui Liang , Zhenfu Cao, Huang Lin and Dongsheng Xing, Provably Secure and Efficient Bounded Ciphertext Policy Attribute Based Encryption, ASIACCS 2009 , Sydney, Australia, 10-12 March 2009.
  • [LRZW09] Jin Li, Kui Ren, Bo Zhu, and Zhiguo Wan, "Privacy-aware Attribute-based Encryption with User Accountability ," ISC 2009, Pisa, Italy, Sept. 7-9, 2009.
  • [NYO09] Takashi Nishide, Kazuki Yoneyama, Kazuo Ohta, "Attribute-Based Encryption with Partially Hidden Ciphertext Policies", IEICE Trans. on Fundamentals, vol.E92.A, No.1, Jan. 2009.
  • [W09] Stefan G. Weber, Securing First Response Coordination With Dynamic Attribute-Based Encryption, Proceedings of Seventh Annual Conference on Privacy, Security and Trust (PST2009).
  • [YRL09] S. Yu, K. Ren, and W. Lou, FDAC: Toward Fine-grained Distributed Data Access Control in Wireless Sensor Networks, IEEE INFOCOM 2009, Rio de Janeiro, Brazil, April 2009.
  • [YRLL09] Shucheng Yu, Kui Ren, Wenjing Lou, and Jin Li, "Defending Against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems," Securecomm 2009, Athens, Greece, Sept. 14-18, 2009.

  • [CCKN08] Ling Cheung, Joseph A. Cooley, Roger Khazan and Calvin Newport. Collusion-Resistant Group Key Management Using Attribute-Based Encryption. In GOCP, 2008.
  • [GJPS08] V. Goyal , A. Jain, O. Pandey , and A. Sahai . Bounded ciphertext policy attribute based encryption. In ICALP, 2008.
  • [K08] Dalia Khader , Authenticating with Attributes, Eprint 2008.
  • [KSW08] Jonathan Katz , Amit Sahai , Brent Waters: Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products. EUROCRYPT 2008 : 146-162.
  • [LCLS08] Huang Lin, Zhenfu Cao, Xiaohui Liang and Jun Shao. Secure threshold multi authority attribute based encryption without a central authority, INDOCRYPT 2008 , Kharagpur, India, December 14-17, 2008.
  • [LK08] Jin Li and Kwangjo Kim , Attribute-Based Ring Signatures, Eprint 2008.
  • [NYO08] Takashi Nishide , Kazuki Yoneyama , Kazuo Ohta, Attribute-Based Encryption with Partially Hidden Encryptor -Specified Access Structures , ACNS2008, LNCS5037, pp.111-129, Jun. 2008.
  • [MPR08] Hemanta Maji and Manoj Prabhakaran and Mike Rosulek , Attribute-Based Signatures: Achieving Attribute-Privacy and Collusion-Resistance, Eprint 2008.
  • [SW08a] Amit Sahai , Brent Waters. Revocation Systems with Very Small Private Keys. Eprint 2008.
  • [SW08b] Elaine Shi , Brent Waters: Delegating Capabilities in Predicate Encryption Systems. ICALP (2) 2008 : 560-578.
  • [TBEM08]
  • [W08] Brent Waters, Ciphertext -Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization, Eprint 2008.

  • [ABK07] G. Ateniese , M. Blanton, and J. Kirsch, Secret Handshakes with Dynamic and Fuzzy Matching , Network and Distributed System Security Symposuim (NDSS'07) , Feb. 2007.
  • [B07] Xavier Boyen : General Ad Hoc Encryption from Exponent Inversion IBE. EUROCRYPT 2007 : 394-411.
  • [BSW07] J. Bethencourt , A. Sahai , and B. Waters. Ciphertext -policy attribute-based encryption. In IEEE Symposium on Security and Privacy , pages 321-334, 2007.
  • [BW07] Dan Boneh , Brent Waters: Conjunctive, Subset, and Range Queries on Encrypted Data. TCC 2007 : 535-554.
  • [C07] M. Chase. Multi-authority attribute based encryption. In TCC , pages 515-534, 2007.
  • [CN07] L. Cheung and C. Newport. Provably secure ciphertext policy abe . In ACM Conference on Computer and Communications Security , pages 456-465, 2007.
  • [KTS07] A. Kapadia , P. Tsang, and S. W. Smith, "Attribute-Based Publishing with Hidden Credentials and Hidden Policies," NDSS '07 , 2007.
  • [OSW07] R. Ostrovsky , A. Sahai , and B. Waters. Attribute-based encryption with non-monotonic access structures. In ACM Conference on Computer and Communications Security , pages 195-203, 2007.
  • [SBCSP07] Elaine Shi, John Bethencourt , Hubert T.-H. Chan , Dawn Xiaodong Song , Adrian Perrig : Multi-Dimensional Range Query over Encrypted Data. IEEE Symposium on Security and Privacy 2007 : 350-364.

  • [ACDMNS06] M. Abdalla, D. Catalano, A. W. Dent, J. M.-Lee, G. Neven and N. P. Smart. Identity-based encryption gone wild. In ICALP (2), pages 300{311, 2006.
  • [BW06] Xavier Boyen , Brent Waters : Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles). CRYPTO 2006 : 290-307.
  • [GPSW06] V. Goyal , O. Pandey , A. Sahai , and B. Waters. Attribute-based encryption for fine-grained access control of encrypted data. In ACM Conference on Computer and Communications Security , pages 89-98, 2006.
  • [PTMW06] M. Pirretti , P. Traynor , P. McDaniel, and B. Waters. Secure attribute-based systems. In ACM Conference on Computer and Communications Security , pages 99-112, 2006.


2005 -- Before
  • [SW05] A. Sahai and B. Waters. Fuzzy identity-based encryption. In EUROCRYPT , pages 457-473, 2005.
 

Last update: Copyright ©2009-2009, Xiaohui Liang