Improving Privacy-Preserving CP-ABE with Hidden Access Policy
暂无分享,去创建一个
Yi Mu | Leyou Zhang | Yilei Cui | Y. Mu | Leyou Zhang | Yilei Cui
[1] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization , 2011, Public Key Cryptography.
[2] Brent Waters,et al. Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles) , 2006, CRYPTO.
[3] Ratna Dutta,et al. Recipient Anonymous Ciphertext-Policy Attribute Based Encryption , 2013, ICISS.
[4] Jinshu Su,et al. An Efficient Searchable Encryption Against Keyword Guessing Attacks for Sharable Electronic Medical Records in Cloud-based System , 2016, Journal of Medical Systems.
[5] Dong Hoon Lee,et al. Anonymous HIBE: Compact Construction Over Prime-Order Groups , 2013, IEEE Trans. Inf. Theory.
[6] Jiguo Li,et al. Ciphertext-Policy Attribute-Based Encryption with Hidden Access Policy and Testing , 2016, KSII Trans. Internet Inf. Syst..
[7] Koutarou Suzuki,et al. Fully Secure Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts , 2011, IACR Cryptol. ePrint Arch..
[8] Guomin Yang,et al. Hidden Ciphertext Policy Attribute-Based Encryption Under Standard Assumptions , 2016, IEEE Transactions on Information Forensics and Security.
[9] Kazuki Yoneyama,et al. Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures , 2008, ACNS.
[10] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[11] Robert H. Deng,et al. Fully Secure Cipertext-Policy Hiding CP-ABE , 2011, ISPEC.
[12] Jin Li,et al. Privacy-Aware Attribute-Based Encryption with User Accountability , 2009, ISC.
[13] Robert H. Deng,et al. Expressive CP-ABE with partially hidden access structures , 2012, ASIACCS '12.
[14] Craig Gentry,et al. Practical Identity-Based Encryption Without Random Oracles , 2006, EUROCRYPT.
[15] Yi Mu,et al. Privacy-Preserving and Secure Sharing of PHR in the Cloud , 2016, Journal of Medical Systems.
[16] Jin Li,et al. Anonymous attribute-based encryption supporting efficient decryption test , 2013, ASIA CCS '13.
[17] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[18] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[19] Hovav Shacham,et al. Short Group Signatures , 2004, CRYPTO.
[20] Allison Bishop,et al. Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption , 2010, EUROCRYPT.
[21] Atsuko Miyaji,et al. A ciphertext-policy attribute-based encryption scheme with constant ciphertext length , 2009, Int. J. Appl. Cryptogr..