A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing
暂无分享,去创建一个
Joseph K. Liu | W. Susilo | K. Liang | D. Wong | Guomin Yang | M. Au | Yong Yu | Anjia Yang
[1] Xiaodong Lin,et al. RCCA-Secure Multi-use Bidirectional Proxy Re-encryption with Master Secret Security , 2014, ProvSec.
[2] Joseph K. Liu,et al. An Efficient Cloud-Based Revocable Identity-Based Proxy Re-encryption Scheme for Public Clouds Data Sharing , 2014, ESORICS.
[3] Jin Li,et al. Securely Outsourcing Attribute-Based Encryption with Checkability , 2014, IEEE Transactions on Parallel and Distributed Systems.
[4] Xiao Tan,et al. Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts , 2014, Theor. Comput. Sci..
[5] Guomin Yang,et al. An Adaptively CCA-Secure Ciphertext-Policy Attribute-Based Proxy Re-Encryption for Cloud Data Sharing , 2014, ISPEC.
[6] Willy Susilo,et al. A Ciphertext-Policy Attribute-Based Proxy Re-encryption with Chosen-Ciphertext Security , 2013, 2013 5th International Conference on Intelligent Networking and Collaborative Systems.
[7] Qiong Huang,et al. A Conditional Proxy Broadcast Re-Encryption Scheme Supporting Timed-Release , 2013, ISPEC.
[8] Keisuke Tanaka,et al. Proxy Re-Encryption in a Stronger Security Model Extended from CT-RSA2012 , 2013, CT-RSA.
[9] Zhen Liu,et al. A CCA-Secure Identity-Based Conditional Proxy Re-Encryption without Random Oracles , 2012, ICISC.
[10] Allison Bishop,et al. New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques , 2012, CRYPTO.
[11] Brent Waters,et al. Functional Encryption for Regular Languages , 2012, CRYPTO.
[12] Vinod Vaikuntanathan,et al. Functional Re-encryption and Collusion-Resistant Obfuscation , 2012, TCC.
[13] Javier Herranz,et al. Attribute-based encryption schemes with constant-size ciphertexts , 2012, Theor. Comput. Sci..
[14] Yunlei Zhao,et al. Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption , 2012, CT-RSA.
[15] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization , 2011, Public Key Cryptography.
[16] Song Luo,et al. Ciphertext Policy Attribute-Based Proxy Re-encryption , 2010, International Conference on Information, Communications and Signal Processing.
[17] A. Miyaji,et al. A Timed-Release Proxy Re-Encryption Scheme , 2010, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[18] Allison Bishop,et al. Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption , 2010, EUROCRYPT.
[19] Jin Li,et al. Hidden attribute-based signatures without anonymity revocation , 2010, Inf. Sci..
[20] Robert H. Deng,et al. CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles , 2010, Science China Information Sciences.
[21] Hiroshi Doi,et al. Hybrid Proxy Re-encryption Scheme for Attribute-Based Encryption , 2009, Inscrypt.
[22] Cong Wang,et al. Enhancing Attribute-Based Encryption with Attribute Hierarchy , 2009, 2009 Fourth International Conference on Communications and Networking in China.
[23] Xiaohui Liang,et al. Attribute based proxy re-encryption with delegating capabilities , 2009, ASIACCS '09.
[24] Amit Sahai,et al. Bounded Ciphertext Policy Attribute Based Encryption , 2008, ICALP.
[25] Benoît Libert,et al. Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption , 2008, IEEE Transactions on Information Theory.
[26] Ling Cheung,et al. Provably secure ciphertext policy ABE , 2007, CCS '07.
[27] Ran Canetti,et al. Chosen-ciphertext secure proxy re-encryption , 2007, CCS '07.
[28] Wen-Guey Tzeng,et al. Identity-Based Proxy Re-encryption Without Random Oracles , 2007, ISC.
[29] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[30] Mihir Bellare,et al. Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir Without Random Oracles , 2007, Public Key Cryptography.
[31] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[32] Matthew Green,et al. Improved proxy re-encryption schemes with applications to secure distributed storage , 2006, TSEC.
[33] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[34] Dan Boneh,et al. Evaluating 2-DNF Formulas on Ciphertexts , 2005, TCC.
[35] Jonathan Katz,et al. Chosen-Ciphertext Security from Identity-Based Encryption , 2004, SIAM J. Comput..
[36] Hugo Krawczyk,et al. Relaxing Chosen-Ciphertext Security , 2003, CRYPTO.
[37] Matt Blaze,et al. Divertible Protocols and Atomic Proxy Cryptography , 1998, EUROCRYPT.
[38] M. Mambo,et al. Proxy Cryptosystems: Delegation of the Power to Decrypt Ciphertexts (Special Section on Cryptography and Information Security) , 1997 .
[39] Ronald Cramer,et al. Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack , 2003, SIAM J. Comput..
[40] A. Beimel. Secure schemes for secret sharing and key distribution , 1996 .