• Publications
  • Influence
Improving privacy and security in multi-authority attribute-based encryption
TLDR
We propose a multi-authority ABE scheme which removes the trusted central authority, and protects the users' privacy by preventing the authorities from pooling their information on particular users, thus making ABE more usable in practice. Expand
  • 819
  • 69
  • PDF
Optimal Sybil-resilient node admission control
TLDR
We propose Gatekeeper, a decentralized Sybil-resilient admission control protocol based on social networks that admits O(log k) Sybil nodes per attack edge with high probability. Expand
  • 170
  • 25
  • PDF
Efficient Unidirectional Proxy Re-Encryption
TLDR
We propose a unidirectional proxy re-encryption scheme without pairing that is very efficient. Expand
  • 182
  • 21
  • PDF
Practical leakage-resilient identity-based encryption from simple assumptions
TLDR
We design the first Leakage-Resilient Identity-Based Encryption (LR-IBE) systems from static assumptions in the standard model, while also preserving the efficiency of the original schemes. Expand
  • 171
  • 20
  • PDF
Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
TLDR
We describe new public-key cryptosystems that produce constant-size ciphertexts such that efficient delegation of decryption rights for any set of Ciphertexts are possible. Expand
  • 301
  • 17
  • PDF
Securely Outsourcing Exponentiations with Single Untrusted Program for Cloud Storage
TLDR
We propose a generic protocol to securely outsource the (most generic) variable-exponent variable-base exponentiations in one untrusted program model. Expand
  • 81
  • 15
Dynamic Data Operations with Deduplication in Privacy-Preserving Public Auditing for Secure Cloud Storage
TLDR
We propose a mechanism that combines data deduplication with dynamic data operations in the privacy preserving public auditing for secure cloud storage. Expand
  • 450
  • 13
Efficient Identity Based Ring Signature
TLDR
We propose a novel construction of ID-based ring signature which only needs two pairing computations for any group size. Expand
  • 158
  • 13
  • PDF
Removing Escrow from Identity-Based Encryption
  • S. Chow
  • Mathematics, Computer Science
  • Public Key Cryptography
  • 12 March 2009
TLDR
We formalize KGC anonymous ciphertext indistinguishability ($\mathcal{ACI-KGC}$) and propose a new system architecture with an anonymous private key generation protocol such that KGC can issue a private key to an authenticated user without knowing the list of users identities. Expand
  • 113
  • 13
Multi-authority ciphertext-policy attribute-based encryption with accountability
TLDR
We propose a multi-authority ciphertext-policy (AND gates with wildcard) ABE scheme with accountability, which allows tracing the identity of a misbehaving user who leaked the decryption key to others, and thus reduces the trust assumptions not only on the authorities but also the users. Expand
  • 148
  • 11