A Certificateless Proxy Re-encryption Scheme for Cloud-Based Blockchain
暂无分享,去创建一个
Liang Sun | Fagen Li | Ke Wang | Nabeil Eltayieb | Fagen Li | Nabeil Eltayieb | K. Wang | Liang Sun
[1] Abdellah Ait Ouahman,et al. Towards a Novel Privacy-Preserving Access Control Model Based on Blockchain Technology in IoT , 2017 .
[2] Alvaro A. Cárdenas,et al. Towards a secure and interoperable DRM architecture , 2006, DRM '06.
[3] Xinwen Zhang,et al. CL-PRE: a certificateless proxy re-encryption scheme for secure data sharing with public cloud , 2012, ASIACCS '12.
[4] Changyu Dong,et al. Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing , 2017, CCS.
[5] Matt Blaze,et al. Divertible Protocols and Atomic Proxy Cryptography , 1998, EUROCRYPT.
[6] Michael Siegel,et al. An IoT Integrity-First Communication Protocol via an Ethereum Blockchain Light Client , 2019, 2019 IEEE/ACM 1st International Workshop on Software Engineering Research & Practices for the Internet of Things (SERP4IoT).
[7] Hui Li,et al. Short-ciphertext and BDH-based CCA2 secure certificateless encryption , 2010, Science China Information Sciences.
[8] Matthew Green,et al. Improved proxy re-encryption schemes with applications to secure distributed storage , 2006, TSEC.
[9] Fagen Li,et al. A Provably Secure Certificateless User Authentication Protocol for Mobile Client-Server Environment , 2017, EIDWT.
[10] Alex Pentland,et al. Decentralizing Privacy: Using Blockchain to Protect Personal Data , 2015, 2015 IEEE Security and Privacy Workshops.
[11] Jörg Schwenk,et al. On Technical Security Issues in Cloud Computing , 2009, 2009 IEEE International Conference on Cloud Computing.
[12] Cheng Chen,et al. Towards a Secure Certificateless Proxy Re-Encryption Scheme , 2013, ProvSec.
[13] Pieter H. Hartel,et al. A Type-and-Identity-Based Proxy Re-encryption Scheme and Its Application in Healthcare , 2008, Secure Data Management.
[14] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[15] Huanshui Zhang,et al. Consensus problems for discrete-time agents with communication delay , 2017 .
[16] Melanie Swan,et al. Blockchain: Blueprint for a New Economy , 2015 .
[17] Fagen Li,et al. Efficient certificateless access control for industrial Internet of Things , 2017, Future Gener. Comput. Syst..
[18] Michael L. Martini,et al. Emerging Blockchain Technology Solutions for Modern Healthcare Infrastructure , 2019, Journal of Scientific Innovation in Medicine.
[19] Elisa Bertino,et al. An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds , 2014, IEEE Transactions on Knowledge and Data Engineering.
[20] Feng Hao,et al. A Smart Contract for Boardroom Voting with Maximum Voter Privacy , 2017, IACR Cryptol. ePrint Arch..
[21] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[22] Anas Abou El Kalam,et al. FairAccess: a new Blockchain-based access control framework for the Internet of Things , 2016, Secur. Commun. Networks.
[23] Luis Rodero-Merino,et al. A break in the clouds: towards a cloud definition , 2008, CCRV.
[24] Hu Xiong,et al. An efficient certificateless public key cryptography with authorized equality test in IIoT , 2020, J. Ambient Intell. Humaniz. Comput..
[25] Kenneth G. Paterson,et al. Certificateless Public Key Cryptography , 2003 .
[26] Lin Sun,et al. An efficient RSA-based certificateless public key encryption scheme , 2017, Discret. Appl. Math..
[27] Jian Shen,et al. Bitcoin-based fair payments for outsourcing computations of fog devices , 2018, Future Gener. Comput. Syst..
[28] Hu Xiong,et al. Efficient Certificateless Public Key Cryptography With Equality Test for Internet of Vehicles , 2019, IEEE Access.