Patient controlled encryption
- 13 November 2009
- conference paper
- conference paper
- Published by Association for Computing Machinery (ACM)
- p. 103-114
- https://doi.org/10.1145/1655008.1655024
Abstract
No abstract availableKeywords
This publication has 14 references indexed in Scilit:
- Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and ExtensionsJournal of Cryptology, 2007
- Searchable symmetric encryptionPublished by Association for Computing Machinery (ACM) ,2006
- Fuzzy Identity-Based EncryptionLecture Notes in Computer Science, 2005
- Public Key Encryption with Keyword SearchLecture Notes in Computer Science, 2004
- Chosen-Ciphertext Security from Identity-Based EncryptionLecture Notes in Computer Science, 2004
- Hierarchical ID-Based CryptographyLecture Notes in Computer Science, 2002
- Identity-Based Cryptosystems and Signature SchemesPublished by Springer Science and Business Media LLC ,2000
- Cryptographic implementation of a tree hierarchy for access controlInformation Processing Letters, 1988
- Cryptographic solution to a problem of access control in a hierarchyACM Transactions on Computer Systems, 1983
- On the generation of cryptographically strong pseudorandom sequencesACM Transactions on Computer Systems, 1983