# Bibliography

Export 5 results:
Author Title Type [ Year]
Filters: Author is Amit Sahai  [Clear All Filters]
2007
. Attribute-based encryption with non-monotonic access structures. In: CCS'07 - Proceedings of the 14th ACM Conference on Computer and Communications Security. CCS'07 - Proceedings of the 14th ACM Conference on Computer and Communications Security. Alexandria, VA, USA: ACM; 2007. pp. 195–203. Available from: http://doi.acm.org/10.1145/1315245.1315270
2006
. Attribute-based encryption for fine-grained access control of encrypted data. In: CCS'06 - Proceedings of the 13th ACM Conference on Computer and Communications Security. CCS'06 - Proceedings of the 13th ACM Conference on Computer and Communications Security. Alexandria, VA, USA: ACM; 2006. pp. 89–98. Available from: http://doi.acm.org/10.1145/1180405.1180418
. Cryptography from Anonymity. Proceedings of the 47th Annual IEEE Symposium on Foundations of Computer Science (FOCS'06)-Volume 00 [Internet]. 2006 :239–248. Available from: http://portal.acm.org/citation.cfm?id=1170505
2005
. Fuzzy Identity-Based Encryption. In: EUROCRYPT'05 Workshop on the Theory and Application of of Cryptographic Techniques. Vol. 3494. EUROCRYPT'05 Workshop on the Theory and Application of of Cryptographic Techniques. Aarhus, Denmark : Springer; 2005.
2003
. Receiver Anonymity via Incomparable Public Keys. In: Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS 2003). Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS 2003). ACM Press; 2003. pp. 112–121. Available from: http://portal.acm.org/citation.cfm?id=948127