Identity-Based Encryption with Post-Challenge Auxiliary Inputs for Secure Cloud Applications and Sensor Networks

Tsz Hon Yuen, Ye Zhang, Siu-Ming Yiu, Joseph K. Liu. Identity-Based Encryption with Post-Challenge Auxiliary Inputs for Secure Cloud Applications and Sensor Networks. In Miroslaw Kutylowski, Jaideep Vaidya, editors, Computer Security - ESORICS 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I. Volume 8712 of Lecture Notes in Computer Science, pages 130-147, Springer, 2014. [doi]

@inproceedings{YuenZYL14,
  title = {Identity-Based Encryption with Post-Challenge Auxiliary Inputs for Secure Cloud Applications and Sensor Networks},
  author = {Tsz Hon Yuen and Ye Zhang and Siu-Ming Yiu and Joseph K. Liu},
  year = {2014},
  doi = {10.1007/978-3-319-11203-9_8},
  url = {http://dx.doi.org/10.1007/978-3-319-11203-9_8},
  researchr = {https://researchr.org/publication/YuenZYL14},
  cites = {0},
  citedby = {0},
  pages = {130-147},
  booktitle = {Computer Security - ESORICS 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I},
  editor = {Miroslaw Kutylowski and Jaideep Vaidya},
  volume = {8712},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  isbn = {978-3-319-11202-2},
}