A Novel User Collusion-Resistant Decentralized Multi-Authority Attribute-Based Encryption Scheme Using the Deposit on a Blockchain
暂无分享,去创建一个
Si-Wan Noh | Kyung-Hyune Rhee | Donghyun Kim | Zhipeng Cai | K. Rhee | Zhipeng Cai | Donghyun Kim | Si-Wan Noh
[1] Ke Zhou,et al. Achieving Privacy-Preserving CP-ABE Access Control with Multi-Cloud , 2018, 2018 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Ubiquitous Computing & Communications, Big Data & Cloud Computing, Social Computing & Networking, Sustainable Computing & Communications (ISPA/IUCC/BDCloud/SocialCom/SustainCom).
[2] Elaine Shi,et al. On Scaling Decentralized Blockchains - (A Position Paper) , 2016, Financial Cryptography Workshops.
[3] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[4] Ang Gao,et al. Free global ID against collusion attack on multi-authority attribute-based encryption , 2013, Secur. Commun. Networks.
[5] Hao Guo,et al. Collusion Attacks on Decentralized Attributed-Based Encryption: Analyses and a Solution , 2020, ArXiv.
[6] Miguel Oom Temudo de Castro,et al. Practical Byzantine fault tolerance , 1999, OSDI '99.
[7] Shoushan Luo,et al. BSSPD: A Blockchain-Based Security Sharing Scheme for Personal Data with Fine-Grained Access Control , 2021, Wirel. Commun. Mob. Comput..
[8] Arthur Gervais,et al. Do you Need a Blockchain? , 2018, 2018 Crypto Valley Conference on Blockchain Technology (CVCBT).
[9] Yingshu Li,et al. Collective Data-Sanitization for Preventing Sensitive Information Inference Attacks in Social Networks , 2018, IEEE Transactions on Dependable and Secure Computing.
[10] Allison Bishop,et al. Decentralizing Attribute-Based Encryption , 2011, IACR Cryptol. ePrint Arch..
[11] A. Shamm. Identity-based cryptosystems and signature schemes , 1985 .
[12] Kyungtae Kang,et al. Removing escrow from ciphertext policy attribute-based encryption , 2013, Comput. Math. Appl..
[13] Khaled Riad,et al. Multi-authority trust access control for cloud storage , 2016, 2016 4th International Conference on Cloud Computing and Intelligence Systems (CCIS).
[14] Christian Decker,et al. Information propagation in the Bitcoin network , 2013, IEEE P2P 2013 Proceedings.
[15] Zhipeng Cai,et al. Adversarial Privacy-Preserving Graph Embedding Against Inference Attack , 2020, IEEE Internet of Things Journal.
[16] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization , 2011, Public Key Cryptography.
[17] Kim-Kwang Raymond Choo,et al. BaDS: Blockchain-Based Architecture for Data Sharing with ABS and CP-ABE in IoT , 2018, Wirel. Commun. Mob. Comput..
[18] Melissa Chase,et al. Multi-authority Attribute Based Encryption , 2007, TCC.
[19] Andrew Miller,et al. Pisa: Arbitration Outsourcing for State Channels , 2019, IACR Cryptol. ePrint Arch..
[20] Maurice Herlihy,et al. Atomic Cross-Chain Swaps , 2018, PODC.
[21] Kyungtae Kang,et al. Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks , 2014, IEEE/ACM Transactions on Networking.
[22] Muttukrishnan Rajarajan,et al. Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption , 2012, IEEE Transactions on Parallel and Distributed Systems.