Mitigating Key Escrow in Attribute-Based Encryption
暂无分享,去创建一个
Guang Yang | Xiaonan Liu | Yongtao Wang | Lulu Liang | Weiduan Feng | Weiduan Feng | Yongtao Wang | Lulu Liang | Xiaonan Liu | Guang Yang
[1] Jin Li,et al. A2BE: Accountable Attribute-Based Encryption for Abuse Free Access Control , 2009, IACR Cryptol. ePrint Arch..
[2] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[3] Min-Shiang Hwang,et al. A Study of Attribute-based Proxy Re-encryption Scheme in Cloud Environments , 2014, Int. J. Netw. Secur..
[4] Benoît Libert,et al. Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys , 2008, Public Key Cryptography.
[5] Brent Waters,et al. Efficient Identity-Based Encryption Without Random Oracles , 2005, EUROCRYPT.
[6] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[7] Craig Gentry,et al. Practical Identity-Based Encryption Without Random Oracles , 2006, EUROCRYPT.
[8] Kefei Chen,et al. Accountable authority key policy attribute-based encryption , 2012, Science China Information Sciences.
[9] Vipul Goyal,et al. Reducing Trust in the PKG in Identity Based Cryptosystems , 2007, CRYPTO.
[10] Joseph K. Liu,et al. Traceable and Retrievable Identity-Based Encryption , 2008, ACNS.
[11] Cheng-Chi Lee,et al. A Survey on Attribute-based Encryption Schemes of Access Control in Cloud Environments , 2013, Int. J. Netw. Secur..
[12] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[13] Benoît Libert,et al. Towards Practical Black-Box Accountable Authority IBE: Weak Black-Box Traceability With Short Ciphertexts and Private Keys , 2011, IEEE Transactions on Information Theory.
[14] 王永涛,et al. Towards accountable authority attribute-based encryption , 2013 .
[15] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[16] Ling Cheung,et al. Provably secure ciphertext policy ABE , 2007, CCS '07.
[17] Dongyao Ji,et al. Verifiable Attribute Based Encryption , 2010, Int. J. Netw. Secur..
[18] Tatsuaki Okamoto,et al. Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes , 1992, CRYPTO.
[19] Amit Sahai,et al. Fully Secure Accountable-Authority Identity-Based Encryption , 2011, Public Key Cryptography.
[20] Ali Miri,et al. Using Threshold Attribute-based Encryption for Practical Biometric-based Access Control , 2005, Int. J. Netw. Secur..
[21] Brent Waters,et al. Black-box accountable authority identity-based encryption , 2008, CCS.
[22] Rafail Ostrovsky,et al. Attribute-based encryption with non-monotonic access structures , 2007, CCS '07.
[23] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[24] Yevgeniy Vahlis,et al. CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption , 2008, CT-RSA.
[25] Torben P. Pedersen. Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing , 1991, CRYPTO.