Attribute-based encryption for fine-grained access control of encrypted data
As more sensitive data is shared and stored by third-party sites on the Internet, there will be
a need to encrypt data stored at these sites. One drawback of encrypting data, is that it can …
a need to encrypt data stored at these sites. One drawback of encrypting data, is that it can …
Fuzzy identity-based encryption
We introduce a new type of Identity-Based Encryption (IBE) scheme that we call Fuzzy
Identity-Based Encryption. In Fuzzy IBE we view an identity as set of descriptive attributes. A …
Identity-Based Encryption. In Fuzzy IBE we view an identity as set of descriptive attributes. A …
Bonsai trees, or how to delegate a lattice basis
We introduce a new lattice-based cryptographic structure called a bonsai tree, and use it to
resolve some important open problems in the area. Applications of bonsai trees include an …
resolve some important open problems in the area. Applications of bonsai trees include an …
Flow fields: Dense correspondence fields for highly accurate large displacement optical flow estimation
Modern large displacement optical flow algorithms usually use an initialization by either
sparse descriptor matching techniques or dense approximate nearest neighbor fields. While …
sparse descriptor matching techniques or dense approximate nearest neighbor fields. While …
Hierarchical identity based encryption with constant size ciphertext
Abstract We present a Hierarchical Identity Based Encryption (HIBE) system where the
ciphertext consists of just three group elements and decryption requires only two bilinear …
ciphertext consists of just three group elements and decryption requires only two bilinear …
A tapestry of identity-based encryption: practical frameworks compared
X Boyen - International Journal of Applied Cryptography, 2008 - inderscienceonline.com
This paper surveys the practical benefits and drawbacks of several identity-based encryption
schemes based on bilinear pairings. After providing some background on identity-based …
schemes based on bilinear pairings. After providing some background on identity-based …
Secure attribute-based systems
Attributes define, classify, or annotate the datum to which they are assigned. However,
traditional attribute architectures and cryptosystems are ill-equipped to provide security in …
traditional attribute architectures and cryptosystems are ill-equipped to provide security in …
Multi-dimensional range query over encrypted data
We design an encryption scheme called Multi-dimensional Range Query over Encrypted
Data (MRQED), to address the privacy concerns related to the sharing of network audit logs …
Data (MRQED), to address the privacy concerns related to the sharing of network audit logs …
Anonymous hierarchical identity-based encryption (without random oracles)
X Boyen, B Waters - Annual International Cryptology Conference, 2006 - Springer
We present an identity-based cryptosystem that features fully anonymous ciphertexts and
hierarchical key delegation. We give a proof of security in the standard model, based on the …
hierarchical key delegation. We give a proof of security in the standard model, based on the …
{JEDI}:{Many-to-Many}{End-to-End} encryption and key delegation for {IoT}
As the Internet of Things (IoT) emerges over the next decade, developing secure
communication for IoT devices is of paramount importance. Achieving end-to-end encryption …
communication for IoT devices is of paramount importance. Achieving end-to-end encryption …