Attribute-based encryption with outsourced decryption in blockchain
暂无分享,去创建一个
[1] Kim-Kwang Raymond Choo,et al. Blockchain-based system for secure outsourcing of bilinear pairings , 2020, Inf. Sci..
[2] Yao Wang,et al. Full Verifiability for Outsourced Decryption in Attribute Based Encryption , 2020, IEEE Transactions on Services Computing.
[3] Jun Shao,et al. Attribute-Based Encryption with Publicly Verifiable Outsourced Decryption , 2019, NSS.
[4] Brent Waters,et al. Realizing Chosen Ciphertext Security Generically in Attribute-Based Encryption and Predicate Encryption , 2019, IACR Cryptol. ePrint Arch..
[5] Michal Król,et al. SPOC: Secure Payments for Outsourced Computations , 2018, ArXiv.
[6] Cong Wang,et al. Searching an Encrypted Cloud Meets Blockchain: A Decentralized, Reliable and Fair Realization , 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications.
[7] Fagen Li,et al. Analysis of an ABE Scheme with Verifiable Outsourced Decryption , 2018, Sensors.
[8] Jin Li,et al. Secure attribute-based data sharing for resource-limited users in cloud computing , 2018, Comput. Secur..
[9] Min Ji,et al. CCA-secure ABE with outsourced decryption for fog computing , 2018, Future Gener. Comput. Syst..
[10] Jian Shen,et al. Bitcoin-based fair payments for outsourcing computations of fog devices , 2018, Future Gener. Comput. Syst..
[11] Rosario Gennaro,et al. Zero-Knowledge Contingent Payments Revisited: Attacks and Payments for Services , 2017, IACR Cryptol. ePrint Arch..
[12] Changyu Dong,et al. Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing , 2017, CCS.
[13] Jiguo Li,et al. Searchable ciphertext‐policy attribute‐based encryption with revocation in cloud storage , 2017, Int. J. Commun. Syst..
[14] Qixiang Mei,et al. Generic and Efficient Constructions of Attribute-Based Encryption with Verifiable Outsourced Decryption , 2016, IEEE Transactions on Dependable and Secure Computing.
[15] Wei Li,et al. TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage , 2016, IEEE Transactions on Parallel and Distributed Systems.
[16] Weixin Xie,et al. An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing , 2016, IEEE Transactions on Information Forensics and Security.
[17] Qiaoyan Wen,et al. Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing , 2016, IEEE Transactions on Parallel and Distributed Systems.
[18] Rui Zhang,et al. A Blockchain based Access Control System for Cloud Storage , 2019 .
[19] Robert H. Deng,et al. Attribute-Based Encryption With Efficient Verifiable Outsourced Decryption , 2015, IEEE Transactions on Information Forensics and Security.
[20] Iddo Bentov,et al. How to Use Bitcoin to Incentivize Correct Computations , 2014, CCS.
[21] Jin Li,et al. Securely Outsourcing Attribute-Based Encryption with Checkability , 2014, IEEE Transactions on Parallel and Distributed Systems.
[22] Juan Benet,et al. IPFS - Content Addressed, Versioned, P2P File System , 2014, ArXiv.
[23] Fuchun Guo,et al. CP-ABE With Constant-Size Keys for Lightweight Devices , 2014, IEEE Transactions on Information Forensics and Security.
[24] Robert H. Deng,et al. Attribute-Based Encryption With Verifiable Outsourced Decryption , 2013, IEEE Transactions on Information Forensics and Security.
[25] Ran Canetti,et al. Refereed delegation of computation , 2013, Inf. Comput..
[26] S. Gokuldev,et al. HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control by separate Encryption/Decryption in Cloud Computing , 2013 .
[27] Zhibin Zhou,et al. Efficient and secure data storage operations for mobile cloud computing , 2012, 2012 8th international conference on network and service management (cnsm) and 2012 workshop on systems virtualiztion management (svm).
[28] Ran Canetti,et al. Two Protocols for Delegation of Computation , 2012, ICITS.
[29] Ran Canetti,et al. Practical delegation of computation using multiple servers , 2011, CCS '11.
[30] Matthew Green,et al. Outsourcing the Decryption of ABE Ciphertexts , 2011, USENIX Security Symposium.
[31] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization , 2011, Public Key Cryptography.
[32] Ya Wang,et al. Cloud Storage as the Infrastructure of Cloud Computing , 2010, 2010 International Conference on Intelligent Computing and Cognitive Informatics.
[33] Allison Bishop,et al. Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption , 2010, EUROCRYPT.
[34] S. Nakamoto,et al. Bitcoin: A Peer-to-Peer Electronic Cash System , 2008 .
[35] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[36] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[37] Nick Szabo,et al. Formalizing and Securing Relationships on Public Networks , 1997, First Monday.
[38] Uriel Feige,et al. Making games short (extended abstract) , 1997, STOC '97.
[39] A. Beimel. Secure schemes for secret sharing and key distribution , 1996 .