Semantic Scholar uses AI to extract papers important to this topic.
We present a new methodology for realizing Ciphertext-Policy Attribute Encryption (CP-ABE) under concrete and noninteractive… Expand Password authentication has been adopted as one of the most commonly used solutions in network environment to protect resources… Expand Storage outsourcing is a rising trend which prompts a number of interesting security issues, many of which have been extensively… Expand In ciphertext policy attribute-based encryption (CP-ABE), every secret key is associated with a set of attributes, and every… Expand We give a provable-security treatment for the key-wrap problem, providing definitions, constructions, and proofs. We suggest that… Expand AbstractWe give an informal analysis and critique of several typical
"provable security" results. In some cases there are… Expand A fundamental problem that confronts peer-to-peer applications is to efficiently locate the node that stores a particular data… Expand A group signature scheme allows a group member to sign messages anonymously on behalf of the group. However, in the case of a… Expand This paper presents a three-move interactive identification scheme and proves it to be as secure as the discrete logarithm… Expand This paper suggests that input and output are basic primitives of programming and that parallel composition of communicating… Expand