Provably Secure Ciphertext-Policy Attribute-Based Encryption from Identity-Based Encryption
暂无分享,去创建一个
[1] Yong Yu,et al. Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage , 2017, IEEE Transactions on Information Forensics and Security.
[2] Nishant Doshi,et al. Hidden Access Structure Ciphertext Policy Attribute Based Encryption with Constant Length Ciphertext , 2011, ADCONS.
[3] Phuong Viet Xuan Tran,et al. Efficient Ciphertext-Policy ABE with constant ciphertext length , 2012, 2012 7th International Conference on Computing and Convergence Technology (ICCCT).
[4] Craig Gentry,et al. Practical Identity-Based Encryption Without Random Oracles , 2006, EUROCRYPT.
[5] Wenjing Lou,et al. Attribute-based content distribution with hidden policy , 2008, 2008 4th Workshop on Secure Network Protocols.
[6] Kazuki Yoneyama,et al. Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures , 2008, ACNS.
[7] Qing Wu,et al. Adaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroups , 2012, Math. Comput. Model..
[8] Fugeng Zeng,et al. Attribute-based encryption with hidden threshold access structure , 2017 .
[9] Umesh Chandra Yadav,et al. Ciphertext-policy attribute-based encryption with hiding access structure , 2015, 2015 IEEE International Advance Computing Conference (IACC).
[10] Guomin Yang,et al. Hidden Ciphertext Policy Attribute-Based Encryption Under Standard Assumptions , 2016, IEEE Transactions on Information Forensics and Security.
[11] Cheng Chen,et al. Efficient Ciphertext Policy Attribute-Based Encryption with Constant-Size Ciphertext and Constant Computation-Cost , 2011, ProvSec.
[12] Bo-Suk Yang,et al. Attribute-Based Cloud Data Integrity Auditing for Secure Outsourced Storage , 2020, IEEE Transactions on Emerging Topics in Computing.
[13] Jin Li,et al. Computationally Efficient Ciphertext-Policy Attribute-Based Encryption with Constant-Size Ciphertexts , 2014, ProvSec.
[14] Cécile Delerablée,et al. Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys , 2007, ASIACRYPT.
[15] Bo Lang,et al. A CP-ABE scheme with hidden policy and its application in cloud computing , 2016, Int. J. Cloud Comput..
[16] Xiaohui Liang,et al. Provably secure and efficient bounded ciphertext policy attribute based encryption , 2009, ASIACCS '09.
[17] Fuchun Guo,et al. CP-ABE With Constant-Size Keys for Lightweight Devices , 2014, IEEE Transactions on Information Forensics and Security.
[18] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[19] Zhibin Zhou,et al. On efficient ciphertext-policy attribute based encryption and broadcast encryption: extended abstract , 2010, CCS '10.
[20] Amit Sahai,et al. Bounded Ciphertext Policy Attribute Based Encryption , 2008, ICALP.
[21] Yanli Ren,et al. Efficient Ciphertext-Policy Attribute Based Encryption with Hidden Policy , 2012, IDCS.
[22] Nuttapong Attrapadung,et al. Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts , 2011, Public Key Cryptography.
[23] Yang Wang,et al. A Tree-Based CP-ABE Scheme with Hidden Policy Supporting Secure Data Sharing in Cloud Computing , 2013, 2013 International Conference on Advanced Cloud and Big Data.
[24] Kim-Kwang Raymond Choo,et al. Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems , 2019, IEEE Transactions on Dependable and Secure Computing.
[25] K. Kuppusamy,et al. Ciphertext Policy Attribute based Encryption with anonymous access policy , 2010, ArXiv.
[26] Stefan Katzenbeisser,et al. Hiding the Policy in Cryptographic Access Control , 2011, STM.
[27] Javier Herranz,et al. Constant Size Ciphertexts in Threshold Attribute-Based Encryption , 2010, Public Key Cryptography.
[28] P. MuraliKrishna,et al. SECURE SCHEMES FOR SECRET SHARING AND KEY DISTRIBUTION USING PELL'S EQUATION , 2013 .
[29] Cheng Chen,et al. Threshold Ciphertext Policy Attribute-Based Encryption with Constant Size Ciphertexts , 2012, ACISP.
[30] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[31] Jin Li,et al. Efficient attribute-based data sharing in mobile clouds , 2016, Pervasive Mob. Comput..
[32] Atsuko Miyaji,et al. A ciphertext-policy attribute-based encryption scheme with constant ciphertext length , 2009, Int. J. Appl. Cryptogr..
[33] Mohsen Guizani,et al. Assured Data Deletion With Fine-Grained Access Control for Fog-Based Industrial Applications , 2018, IEEE Transactions on Industrial Informatics.
[34] Guomin Yang,et al. POSTER: Efficient Ciphertext Policy Attribute Based Encryption Under Decisional Linear Assumption , 2014, CCS.
[35] Robert H. Deng,et al. Fully Secure Cipertext-Policy Hiding CP-ABE , 2011, ISPEC.
[36] Rafail Ostrovsky,et al. Attribute-based encryption with non-monotonic access structures , 2007, CCS '07.
[37] Ling Cheung,et al. Provably secure ciphertext policy ABE , 2007, CCS '07.
[38] Xiaojiang Du,et al. Efficient attribute-based encryption with attribute revocation for assured data deletion , 2018, Inf. Sci..
[39] Cheng Chen,et al. Fully Secure Attribute-Based Systems with Short Ciphertexts/Signatures and Threshold Access Structures , 2013, CT-RSA.
[40] K. Kuppusamy,et al. Privacy Preserving Ciphertext Policy Attribute Based Encryption , 2010, CNSA.
[41] Devesh C. Jinwala,et al. A Novel Approach for Searchable CP-ABE with Hidden Ciphertext-Policy , 2014, ICISS.
[42] Zhiwei Wang,et al. CP-ABE with Hidden Policy from Waters Efficient Construction , 2016, Int. J. Distributed Sens. Networks.
[43] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization , 2011, Public Key Cryptography.
[44] Aggelos Kiayias,et al. Lower Bounds for Private Broadcast Encryption , 2012, Information Hiding.
[45] Zhibin Zhou,et al. Efficient Privacy-Preserving Ciphertext-Policy Attribute Based-Encryption and Broadcast Encryption , 2015, IEEE Transactions on Computers.