Nuttapong Attrapadung
Nuttapong Attrapadung
AIST, Japan
Adresse e-mail validée de aist.go.jp
Titre
Citée par
Citée par
Année
Expressive key-policy attribute-based encryption with constant-size ciphertexts
N Attrapadung, B Libert, E De Panafieu
International workshop on public key cryptography, 90-108, 2011
3942011
Conjunctive broadcast and attribute-based encryption
N Attrapadung, H Imai
International conference on pairing-based cryptography, 248-265, 2009
2992009
Attribute-based encryption schemes with constant-size ciphertexts
N Attrapadung, J Herranz, F Laguillaumie, B Libert, E De Panafieu, ...
Theoretical computer science 422, 15-38, 2012
2232012
Attribute-based encryption supporting direct/indirect revocation modes
N Attrapadung, H Imai
IMA international conference on cryptography and coding, 278-300, 2009
1832009
Dual system encryption via doubly selective security: Framework, fully secure functional encryption for regular languages, and more
N Attrapadung
Annual International Conference on the Theory and Applications of …, 2014
1702014
Functional encryption for inner product: Achieving constant-size ciphertexts with adaptive security or support for negation
N Attrapadung, B Libert
International Workshop on Public Key Cryptography, 384-402, 2010
1562010
Dual-policy attribute based encryption
N Attrapadung, H Imai
International Conference on Applied Cryptography and Network Security, 168-185, 2009
1092009
Computing on authenticated data: New privacy definitions and constructions
N Attrapadung, B Libert, T Peters
International Conference on the Theory and Application of Cryptology and …, 2012
1002012
Homomorphic network coding signatures in the standard model
N Attrapadung, B Libert
International Workshop on Public Key Cryptography, 17-34, 2011
922011
Generic constructions for chosen-ciphertext secure attribute based encryption
S Yamada, N Attrapadung, G Hanaoka, N Kunihiro
International Workshop on Public Key Cryptography, 71-89, 2011
842011
Dual system encryption framework in prime-order groups via computational pair encodings
N Attrapadung
International Conference on the Theory and Application of Cryptology and …, 2016
792016
A framework and compact constructions for non-monotonic attribute-based encryption
S Yamada, N Attrapadung, G Hanaoka, N Kunihiro
International Workshop on Public Key Cryptography, 275-292, 2014
742014
Efficient completely context-hiding quotable and linearly homomorphic signatures
N Attrapadung, B Libert, T Peters
International Workshop on Public Key Cryptography, 386-404, 2013
742013
A framework for identity-based encryption with almost tight security
N Attrapadung, G Hanaoka, S Yamada
International Conference on the Theory and Application of Cryptology and …, 2015
542015
Sequential key derivation patterns for broadcast encryption and key predistribution schemes
N Attrapadung, K Kobara, H Imai
International Conference on the Theory and Application of Cryptology and …, 2003
482003
Duality in ABE: converting attribute based encryption for dual predicate and dual policy via computational encodings
N Attrapadung, S Yamada
Cryptographers’ track at the RSA conference, 87-105, 2015
452015
Forward-secure and searchable broadcast encryption with short ciphertexts and private keys
N Attrapadung, J Furukawa, H Imai
International Conference on the Theory and Application of Cryptology and …, 2006
422006
Verifiable predicate encryption and applications to CCA security and anonymous predicate authentication
S Yamada, N Attrapadung, B Santoso, JCN Schuldt, G Hanaoka, ...
International Workshop on Public Key Cryptography, 243-261, 2012
402012
Conversions among several classes of predicate encryption and applications to ABE with various compactness tradeoffs
N Attrapadung, G Hanaoka, S Yamada
International Conference on the Theory and Application of Cryptology and …, 2015
352015
Time-specific encryption from forward-secure encryption
K Kasamatsu, T Matsuda, K Emura, N Attrapadung, G Hanaoka, H Imai
International Conference on Security and Cryptography for Networks, 184-204, 2012
332012
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20