Understanding Public-Key Infrastructure: Concepts, Standards, and Deployment Considerations, 1999. ,
Escrow-free encryption supporting cryptographic workflow, International Journal of Information Security, vol.22, issue.4, 2004. ,
DOI : 10.1007/s10207-006-0002-x
Certificateless Public Key Cryptography, ASIACRYPT, pp.452-473, 2003. ,
DOI : 10.1007/978-3-540-40061-5_29
Predicates for boolean web service policy languages, WWW 2005 Workshop on Policy Management for the Web, 2005. ,
Proof-carrying authentication, Proceedings of the 6th ACM conference on Computer and communications security , CCS '99, pp.52-62, 1999. ,
DOI : 10.1145/319709.319718
Anonymous yet accountable access control, Proceedings of the 2005 ACM workshop on Privacy in the electronic society , WPES '05, pp.40-46, 2005. ,
DOI : 10.1145/1102199.1102208
Efficient Multi-receiver Identity-Based Encryption and Its Application to Broadcast Encryption, Public Key Cryptography, pp.380-397, 2005. ,
DOI : 10.1007/978-3-540-30580-4_26
Identity-Based Threshold Decryption, 2004. ,
DOI : 10.1007/978-3-540-24632-9_19
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.118.1878
Identity-based threshold signature scheme from the bilinear pairings, ITCC '04: Proceedings of the International Conference on Information Technology: Coding and Computing, 2004. ,
Efficient comparison of enterprise privacy policies, SAC '04: Proceedings of the 2004 ACM symposium on Applied computing, pp.375-382, 2004. ,
Distance-bounding proof of knowledge to avoid real-time attacks, SEC, pp.223-238, 2005. ,
Establishment of Ad-Hoc Communities through Policy-Based Cryptography, To appear in Proceedings of Workshop on Cryptography for Ad hoc Networks (WCAN'06), 2006. ,
DOI : 10.1016/j.entcs.2006.11.013
Proof-Carrying Proxy Certificates, Proceedings of Conference on Security and Cryptography for Networks, pp.321-335, 2006. ,
DOI : 10.1007/11832072_22
Policy-Based Cryptography and Applications, Proceedings of Financial Cryptography and Data Security (FC'05), pp.72-87, 2005. ,
DOI : 10.1007/11507840_7
URL : https://hal.archives-ouvertes.fr/pastel-00002525
Collusion-Free Policy-Based Encryption, Proceedings of Information Security Conference (ISC'06), 2006. ,
DOI : 10.1007/11836810_17
Policy-based encryption schemes from bilinear pairings, Proceedings of the 2006 ACM Symposium on Information, computer and communications security , ASIACCS '06, pp.368-368, 2006. ,
DOI : 10.1145/1128817.1128886
Secret handshakes from pairing-based key agreements, Proceedings 19th International Conference on Data Engineering (Cat. No.03CH37405), p.180, 2003. ,
DOI : 10.1109/SECPRI.2003.1199336
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.115.9132
Efficient algorithms for pairing-based cryptosystems [22] P. Barretto. The pairing-based crypto lounge, Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology, pp.354-368, 2002. ,
DOI : 10.1007/3-540-45708-9_23
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.120.3363
Negotiating trust on the grid, 2nd WWW Workshop on Semantics in P2P and Grid Computing, 2004. ,
Extended Notions of Security for Multicast Public Key Cryptosystems, ICALP '00: Proceedings of the 27th International Colloquium on Automata, Languages and Programming, pp.499-511, 2000. ,
DOI : 10.1007/3-540-45022-X_42
Practice-oriented provable-security, ISW '97: Proceedings of the First International Workshop on Information Security, pp.221-231, 1998. ,
Public-Key Encryption in a Multi-user Setting: Security Proofs and Improvements, EUROCRYPT, pp.259-274, 2000. ,
DOI : 10.1007/3-540-45539-6_18
Randomness Re-use in Multi-recipient Encryption Schemeas, PKC '03: Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography, pp.85-99, 2003. ,
DOI : 10.1007/3-540-36288-6_7
A concrete security treatment of symmetric encryption, Proceedings 38th Annual Symposium on Foundations of Computer Science, p.394, 1997. ,
DOI : 10.1109/SFCS.1997.646128
Relations among notions of security for public-key encryption schemes, CRYPTO '98: Proceedings of the 18th Annual International Cryptology Conference on Advances in Cryptology, pp.26-45, 1998. ,
DOI : 10.1007/BFb0055718
Security proofs for identity-based identification and signature schemes, Cachin and Camenisch [45], pp.268-286 ,
DOI : 10.1007/978-3-540-24676-3_17
URL : https://lirias.kuleuven.be/bitstream/123456789/234453/3/article-558.pdf
Random oracles are practical, Proceedings of the 1st ACM conference on Computer and communications security , CCS '93, pp.62-73, 1993. ,
DOI : 10.1145/168588.168596
Generalized Secret Sharing and Monotone Functions, CRYPTO '88: Proceedings on Advances in cryptology, pp.27-35, 1990. ,
DOI : 10.1007/0-387-34799-2_3
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.698.1352
Secure and selective dissemination of XML documents, ACM Transactions on Information and System Security, vol.5, issue.3, pp.290-331, 2002. ,
DOI : 10.1145/545186.545190
Trust negotiations: concepts, systems, and languages, Computing in Science and Engineering, vol.6, issue.4, pp.27-34, 2004. ,
DOI : 10.1109/MCSE.2004.22
Elliptic curves in cryptography, 1999. ,
DOI : 10.1017/CBO9781107360211
Safeguarding cryptographic keys, National Computer Conference, pp.313-317, 1979. ,
Hierarchical Identity Based Encryption with Constant Size Ciphertext, Lecture Notes in Computer Science, vol.3494, pp.440-456, 2005. ,
DOI : 10.1007/11426639_26
Identity-based encryption from the weil pairing, Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology, pp.213-229, 2001. ,
Short signatures from the weil pairing, Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security, pp.514-532, 2001. ,
On the value of threshold signatures, ACM SIGOPS Operating Systems Review, vol.36, issue.4, pp.30-35, 2002. ,
DOI : 10.1145/583800.583804
Client-Based Access Control Management for XML documents, VLDB, pp.84-95, 2004. ,
DOI : 10.1016/B978-012088469-8.50011-5
URL : https://hal.archives-ouvertes.fr/inria-00070718
Concealing complex policies with hidden credentials . Cryptology ePrint Archive, Report, vol.109, 2004. ,
DOI : 10.1145/1030083.1030104
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.88.267
Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy, 2000. ,
Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy, 2000. ,
anonymous credential system, Proceedings of the 9th ACM conference on Computer and communications security , CCS '02, pp.21-30, 2002. ,
DOI : 10.1145/586110.586114
An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation, EUROCRYPT, p.93, 2001. ,
DOI : 10.1007/3-540-44987-6_7
The random oracle methodology, revisited, Journal of the ACM, vol.51, issue.4, pp.557-594, 2004. ,
DOI : 10.1145/1008731.1008734
Secret Handshakes from CA-Oblivious Encryption, 2004. ,
DOI : 10.1007/978-3-540-30539-2_21
Efficient ID-based Broadcast Threshold Decryption in Ad Hoc Network, First International Multi-Symposiums on Computer and Computational Sciences (IMSCCS'06), pp.148-154, 2006. ,
DOI : 10.1109/IMSCCS.2006.217
Security without identification: transaction systems to make big brother obsolete, Communications of the ACM, vol.28, issue.10, pp.1030-1044, 1985. ,
DOI : 10.1145/4372.4373
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.319.3690
Applications of Multiple Trust Authorities in Pairing Based Cryptosystems, Proceedings of the International Conference on Infrastructure Security, pp.260-275, 2002. ,
DOI : 10.1007/3-540-45831-X_18
Proposal for adding compositors to wsdl 2.0, 2004. ,
Proxy certificates-based digital fingerprinting scheme for mobile communication, IEEE 37th Annual 2003 International Carnahan Conference on Security, pp.587-594, 2003. ,
Identity Based Ring Signature: Why, How and What Next, EuroPKI, pp.144-161, 2005. ,
DOI : 10.1007/11533733_10
Efficient Identity Based Ring Signature, ACNS, pp.499-512, 2005. ,
DOI : 10.1007/11496137_34
(How) can mobile agents do secure electronic transactions on untrusted hosts? A survey of the security issues and the current solutions, ACM Transactions on Internet Technology, vol.3, issue.1, pp.28-48, 2003. ,
DOI : 10.1145/643477.643479
The symbolic construction of community, 1985. ,
DOI : 10.4324/9780203323373
The Platform for Privacy Preferences 1.0 (P3P1.0) Specification, 2002. ,
A fine-grained access control system for XML documents, ACM Transactions on Information and System Security, vol.5, issue.2, pp.169-202, 2002. ,
DOI : 10.1145/505586.505590
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.14.9859
A survey of certificateless encryption schemes and security models, International Journal of Information Security, vol.21, issue.1, 2006. ,
DOI : 10.1007/s10207-008-0055-0
Threshold cryptography, European Transactions on Telecommunications, vol.35, issue.1, pp.449-457, 1994. ,
DOI : 10.1002/ett.4460050407
New directions in cryptography, IEEE Transactions on Information Theory, vol.22, issue.6, pp.22644-654, 1976. ,
DOI : 10.1109/TIT.1976.1055638
Anonymous Identification in Ad Hoc Groups, Cachin and Camenisch [45], pp.609-626 ,
DOI : 10.1007/978-3-540-24676-3_36
Exposure-resilience for free: the hierarchical ID-based encryption case, First International IEEE Security in Storage Workshop, 2002. Proceedings., pp.45-52, 2002. ,
DOI : 10.1109/SISW.2002.1183509
Fast Elliptic Curve Arithmetic and Improved Weil Pairing Evaluation, Lecture Notes in Computer Science, vol.2612, pp.343-354, 1998. ,
DOI : 10.1007/3-540-36563-X_24
Broadcast Encryption, CRYPTO '93: Proceedings of the 13th annual international cryptology conference on Advances in cryptology, pp.480-491, 1994. ,
DOI : 10.1007/3-540-48329-2_40
How To Prove Yourself: Practical Solutions to Identification and Signature Problems, Proceedings on Advances in cryptology?CRYPTO '86, pp.186-194, 1987. ,
DOI : 10.1007/3-540-47721-7_12
How To Prove Yourself: Practical Solutions to Identification and Signature Problems, Advances in Cryptology ? Crypto '86, pp.186-194, 1987. ,
DOI : 10.1007/3-540-47721-7_12
Zero knowledge proofs of identity, Proceedings of the nineteenth annual ACM conference on Theory of computing , STOC '87, pp.210-217, 1987. ,
DOI : 10.1145/28395.28419
Parallel reliable threshold multisignature, 1992. ,
The Tate pairing and the discrete logarithm applied to elliptic curve cryptosystems, IEEE Transactions on Information Theory, vol.45, issue.5, 1999. ,
DOI : 10.1109/18.771254
How to Enhance the Security of Public-Key Encryption at Minimum Cost, Public Key Cryptography (PKC), pp.53-68, 1999. ,
DOI : 10.1007/3-540-49162-7_5
Secure integration of asymmetric and symmetric encryption schemes, Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology, pp.537-554, 1999. ,
Specifying access control policies for XML documents with XPath, Proceedings of the ninth ACM symposium on Access control models and technologies , SACMAT '04, pp.61-69, 2004. ,
DOI : 10.1145/990036.990046
Boneh-Franklin Identity Based Encryption Revisited, Proceedings of 32nd International Colloquium on Automata, Languages and Programming, 2005. ,
DOI : 10.1007/11523468_64
The generalized Weil pairing and the discrete logarithm problem on elliptic curves, Theoretical Computer Science, vol.321, issue.1, pp.59-72, 2004. ,
DOI : 10.1016/j.tcs.2003.06.002
Self-certified public keys, EUROCRYPT, pp.490-497, 1991. ,
DOI : 10.1007/3-540-46416-6_42
Probabilistic encryption, Journal of Computer and System Sciences, vol.28, issue.2, pp.270-299, 1984. ,
DOI : 10.1016/0022-0000(84)90070-9
URL : http://doi.org/10.1016/0022-0000(84)90070-9
A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks, SIAM Journal on Computing, vol.17, issue.2, pp.281-308, 1988. ,
DOI : 10.1137/0217017
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.20.8353
Guide to Elliptic Curve Cryptography, 2003. ,
A formal proof of security of zhang and kim's id-based ring signature scheme, WOSIS'04, pp.63-72, 2004. ,
New Identity-Based Ring Signature Schemes, ICICS, pp.27-39, 2004. ,
DOI : 10.1007/978-3-540-30191-2_3
Pseudonym systems, SAC '03: Proceedings of the 9th Annual International Workshop on Selected Areas in Cryptography, pp.310-324, 2003. ,
Reconciling ca-oblivious encryption, hidden credentials, osbe and secret handshakes, Cryptology ePrint Archive Report, vol.215, 2005. ,
Hidden Credentials, Proceeding of the ACM workshop on Privacy in the electronic society , WPES '03, 2003. ,
DOI : 10.1145/1005140.1005142
Public-key cryptography standards (pkcs) #1: Rsa cryptography specifications version 2.1. RFC 3447, 2003. ,
A one round protocol for tripartite diffie-hellman, ANTS-IV: Proceedings of the 4th International Symposium on Algorithmic Number Theory, pp.385-394, 2000. ,
The Weil and Tate Pairings as Building Blocks for Public Key Cryptosystems, Proceedings of the 5th International Symposium on Algorithmic Number Theory, pp.20-32, 2002. ,
DOI : 10.1007/3-540-45455-1_3
Entropy, independent sets and antichains: a new approach to dedekind's problem, Proc. Amer. Math. Soc. 130, pp.371-378, 2002. ,
Platform for Enterprise Privacy Practices: Privacy-Enabled Management of Customer Data, 2nd Workshop on Privacy Enhancing Technologies, pp.69-84, 2002. ,
DOI : 10.1007/3-540-36467-6_6
PEACE: A Policy-Based Establishment of Ad-hoc Communities, 20th Annual Computer Security Applications Conference, pp.386-395, 2004. ,
DOI : 10.1109/CSAC.2004.26
On dedekind's problem: the number of monotone boolean functions, Proc. Amer. Math. Soc. 21, pp.677-682, 1969. ,
Elliptic curve cryptosystems, Mathematics of Computation, vol.48, issue.177, pp.203-209, 1987. ,
DOI : 10.1090/S0025-5718-1987-0866109-5
Toward a Practical Public-Key Cryptosystem, 1978. ,
XML document security based on provisional authorization, Proceedings of the 7th ACM conference on Computer and communications security , CCS '00, pp.87-96, 2000. ,
DOI : 10.1145/352600.352613
Multi-recepient public-key encryption with shortened ciphertext, Public Key Cryptography (PKC), 2002. ,
Generalized threshold cryptosystems, ASIACRYPT '91: Proceedings of the International Conference on the Theory and Applications of Cryptology, pp.159-166, 1993. ,
DOI : 10.1007/3-540-57332-1_13
Self-certified Signatures, INDOCRYPT '02: Proceedings of the Third International Conference on Cryptology, pp.199-214, 2002. ,
DOI : 10.1007/3-540-36231-2_17
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.12.527
Oacerts: Oblivious attribute certificates ,
DOI : 10.1007/11496137_21
Policy-hiding access control in open environment, Proceedings of the twenty-fourth annual ACM SIGACT-SIGOPS symposium on Principles of distributed computing , PODC '05, pp.29-38, 2005. ,
DOI : 10.1145/1073814.1073819
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.84.6147
Automated trust negotiation using cryptographic credentials, CCS '05: Proceedings of the 12th ACM conference on Computer and communications security, pp.46-57, 2005. ,
DOI : 10.1145/1609956.1609958
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.158.5189
Oblivious signature-based envelope, Proceedings of the 22nd annual symposium on Principles of distributed computing, pp.182-189, 2003. ,
DOI : 10.1007/s00446-004-0116-1
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.12.8946
Oblivious signature-based envelope, Distributed Computing, vol.6, issue.4, pp.293-302, 2005. ,
DOI : 10.1007/s00446-004-0116-1
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.12.8946
Efficient revocation and threshold pairing based cryptosystems, Proceedings of the twenty-second annual symposium on Principles of distributed computing , PODC '03, pp.163-171, 2003. ,
DOI : 10.1145/872035.872059
An identity-based ring signature scheme from bilinear pairings. Cryptology ePrint Archive, Report, vol.117, 2003. ,
Pseudonym Systems, SAC '99: Proceedings of the 6th Annual International Workshop on Selected Areas in Cryptography, pp.184-199, 2000. ,
DOI : 10.1007/3-540-46513-8_14
Pseudonym Systems, SAC '99: Proceedings of the 6th Annual International Workshop on Selected Areas in Cryptography, pp.184-199, 2000. ,
DOI : 10.1007/3-540-46513-8_14
Reducing elliptic curve logarithms to logarithms in a finite field, STOC '91: Proceedings of the twenty-third annual ACM symposium on Theory of computing, pp.80-89, 1991. ,
Cryptographically enforced conditional access for XML, Fifth International Workshop on the Web and Databases, 2002. ,
Controlling Access to Published Data Using Cryptography, International Conference on Very Large Data Bases, pp.898-909, 2003. ,
DOI : 10.1016/B978-012722442-8/50084-7
Use of elliptic curves in cryptography In Lecture notes in computer sciences; 218 on Advances in cryptology?CRYPTO 85, pp.417-426, 1986. ,
Proof-carrying code, Proceedings of the 24th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '97, pp.106-119, 1997. ,
DOI : 10.1145/263699.263712
Proxy-based authorization and accounting for distributed systems, [1993] Proceedings. The 13th International Conference on Distributed Computing Systems, pp.283-291, 1993. ,
DOI : 10.1109/ICDCS.1993.287698
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.31.9640
Self-certified keys: Concepts and applications, 1997. ,
Security Proofs for Signature Schemes, Lecture Notes in Computer Science, vol.1070, p.387, 1996. ,
DOI : 10.1007/3-540-68339-9_33
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.12.978
Security Arguments for Digital Signatures and Blind Signatures, Journal of Cryptology, vol.13, issue.3, pp.361-396, 2000. ,
DOI : 10.1007/s001450010003
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.11.8213
Cryptosystems based on pairings, Proceedings of the symposium on cryptography and information security (SCIS'00, 2000. ,
A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, vol.21, issue.2, pp.120-126, 1978. ,
DOI : 10.1145/359340.359342
How to Leak a Secret, Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security, pp.552-565, 2001. ,
DOI : 10.1007/3-540-45682-1_32
Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance, Cryptology ePrint Archive Report, vol.035, 2004. ,
DOI : 10.1007/978-3-540-25937-4_24
Identity-based and self-certified key-exchange protocols, ACISP '97: Proceedings of the Second Australasian Conference on Information Security and Privacy, pp.303-313, 1997. ,
DOI : 10.1007/BFb0027937
A note on Girault's self-certified model, Information Processing Letters, vol.86, issue.6, pp.323-327, 2003. ,
DOI : 10.1016/S0020-0190(03)00203-5
Efficient identification and signatures for smart cards, EUROCRYPT '89: Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology, pp.688-689, 1990. ,
How to share a secret, Communications of the ACM, vol.22, issue.11, pp.612-613, 1979. ,
DOI : 10.1145/359168.359176
Identity-Based Cryptosystems and Signature Schemes, Proceedings of CRYPTO 84 on Advances in cryptology, pp.47-53, 1985. ,
DOI : 10.1007/3-540-39568-7_5
Access Control Using Pairing Based Cryptography, Proceedings CT-RSA 2003, pp.111-121, 2003. ,
DOI : 10.1007/3-540-36563-X_8
Bibliography on secret sharing schemes ,
Evidence that xtr is more secure than supersingular elliptic curve cryptosystems, EUROCRYPT '01: Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques, pp.195-210, 2001. ,
Automated trust negotiation, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00, 2000. ,
DOI : 10.1109/DISCEX.2000.824965
62 and FIPS 186-2. Elliptic curve digital signature algorithm, 1998. ,
A note on the bilinear diffie-hellman assumption, Cryptology ePrint Archive Report, vol.113, 2002. ,
Survey on xml-based policy languages for open environments, Information Assurance and Security, vol.1, issue.1, pp.11-20, 2006. ,
ID-Based Blind Signature and Ring Signature from Pairings, ASIACRYPT, pp.533-547, 2002. ,
DOI : 10.1007/3-540-36178-2_33
An Efficient Signature Scheme from Bilinear Pairings and Its Applications, Public Key Cryptography, pp.277-290, 2004. ,
DOI : 10.1007/978-3-540-24632-9_20