Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization

B Waters - International workshop on public key cryptography, 2011 - Springer
We present a new methodology for realizing Ciphertext-Policy Attribute Encryption (CP-ABE)
under concrete and noninteractive cryptographic assumptions in the standard model. Our …

Certificateless public key cryptography

SS Al-Riyami, KG Paterson - International conference on the theory and …, 2003 - Springer
This paper introduces and makes concrete the concept of certificateless public key
cryptography (CL-PKC), a model for the use of public key cryptography which avoids the …

Privacy management of personal data

MC Mont, KA Harrison, M Sadler… - US Patent 7,398,393, 2008 - Google Patents
As used herein, the term “personal data'is intended to include data such as identity data and
profile data (for example, preference data and financial data) of a party to which the data …

Towards accountable management of identity and privacy: Sticky policies and enforceable tracing services

MC Mont, S Pearson, P Bramhall - 14th International Workshop …, 2003 - ieeexplore.ieee.org
Digital identities and profiles are precious assets. On one hand they enable users to engage
in transactions and interactions on the Internet. On the other hand, abuses and leakages of …

Identity based authenticated key agreement protocols from pairings

L Chen, C Kudla - 16th IEEE Computer Security Foundations …, 2003 - ieeexplore.ieee.org
We investigate a number of issues related to identity based authenticated key agreement
protocols in the Diffie-Hellman family enabled by the Weil or Tate pairings. These issues …

Context awareness and adaptation in mobile learning

YK Wang - The 2nd IEEE International Workshop on Wireless …, 2004 - ieeexplore.ieee.org
This study investigates the importance of context-awareness and adaptation in mobile
learning. Context-aware mobile learning that senses mobile environment and reacts to …

New proxy signature, proxy blind signature and proxy ring signature schemes from bilinear pairing

F Zhang, R Safavi-Naini, CY Lin - Cryptology ePrint Archive, 2003 - eprint.iacr.org
Proxy signatures are very useful tools when one needs to delegate his/her signing capability
to other party. After Mambo $ et\al. $'s first scheme was announced, many proxy signature …

Access control for security and privacy in ubiquitous computing environments

S Yamada, E Kamioka - IEICE transactions on communications, 2005 - search.ieice.org
Ubiquitous computing (ubicomp) demands new security and privacy enhancing
technologies for the new information and communication environments where a huge …

A flexible role-based secure messaging service: Exploiting IBE technology for privacy in health care

MC Mont, P Bramhall, K Harrison - 14th International Workshop …, 2003 - ieeexplore.ieee.org
The management of private and confidential information is a major problem for dynamic
organizations. Secure solutions are needed to exchange confidential documents, protect …

[PDF][PDF] Cryptography from pairings

KG Paterson - London mathematical society lecture note series, 2006 - Citeseer
This chapter presents a survey of positive applications of pairings in cryptography. We
assume the reader has a basic understanding of concepts from cryptography such as public …