Attribute-based encryption for fine-grained access control of encrypted data

V Goyal, O Pandey, A Sahai, B Waters - … of the 13th ACM conference on …, 2006 - dl.acm.org
As more sensitive data is shared and stored by third-party sites on the Internet, there will be
a need to encrypt data stored at these sites. One drawback of encrypting data, is that it can …

Fuzzy identity-based encryption

A Sahai, B Waters - Advances in Cryptology–EUROCRYPT 2005: 24th …, 2005 - Springer
We introduce a new type of Identity-Based Encryption (IBE) scheme that we call Fuzzy
Identity-Based Encryption. In Fuzzy IBE we view an identity as set of descriptive attributes. A …

Bonsai trees, or how to delegate a lattice basis

D Cash, D Hofheinz, E Kiltz, C Peikert - Journal of cryptology, 2012 - Springer
We introduce a new lattice-based cryptographic structure called a bonsai tree, and use it to
resolve some important open problems in the area. Applications of bonsai trees include an …

Flow fields: Dense correspondence fields for highly accurate large displacement optical flow estimation

C Bailer, B Taetz, D Stricker - Proceedings of the IEEE …, 2015 - openaccess.thecvf.com
Modern large displacement optical flow algorithms usually use an initialization by either
sparse descriptor matching techniques or dense approximate nearest neighbor fields. While …

Hierarchical identity based encryption with constant size ciphertext

D Boneh, X Boyen, EJ Goh - Annual international conference on the theory …, 2005 - Springer
Abstract We present a Hierarchical Identity Based Encryption (HIBE) system where the
ciphertext consists of just three group elements and decryption requires only two bilinear …

A tapestry of identity-based encryption: practical frameworks compared

X Boyen - International Journal of Applied Cryptography, 2008 - inderscienceonline.com
This paper surveys the practical benefits and drawbacks of several identity-based encryption
schemes based on bilinear pairings. After providing some background on identity-based …

Secure attribute-based systems

M Pirretti, P Traynor, P McDaniel, B Waters - Proceedings of the 13th …, 2006 - dl.acm.org
Attributes define, classify, or annotate the datum to which they are assigned. However,
traditional attribute architectures and cryptosystems are ill-equipped to provide security in …

Multi-dimensional range query over encrypted data

E Shi, J Bethencourt, THH Chan… - … IEEE Symposium on …, 2007 - ieeexplore.ieee.org
We design an encryption scheme called Multi-dimensional Range Query over Encrypted
Data (MRQED), to address the privacy concerns related to the sharing of network audit logs …

Anonymous hierarchical identity-based encryption (without random oracles)

X Boyen, B Waters - Annual International Cryptology Conference, 2006 - Springer
We present an identity-based cryptosystem that features fully anonymous ciphertexts and
hierarchical key delegation. We give a proof of security in the standard model, based on the …

{JEDI}:{Many-to-Many}{End-to-End} encryption and key delegation for {IoT}

S Kumar, Y Hu, MP Andersen, RA Popa… - 28th USENIX security …, 2019 - usenix.org
As the Internet of Things (IoT) emerges over the next decade, developing secure
communication for IoT devices is of paramount importance. Achieving end-to-end encryption …