k-Times Attribute-Based Anonymous Access Control for Cloud Computing
暂无分享,去创建一个
Tsz Hon Yuen | Joseph K. Liu | Jianying Zhou | Willy Susilo | Man Ho Au | Xinyi Huang | Joseph K. Liu | W. Susilo | Xinyi Huang | Jianying Zhou | M. Au
[1] Mihir Bellare,et al. On Defining Proofs of Knowledge , 1992, CRYPTO.
[2] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[3] Ivan Damgård,et al. Efficient Zero-Knowledge Proofs of Knowledge Without Intractability Assumptions , 2000, Public Key Cryptography.
[4] Yael Tauman Kalai,et al. How to Leak a Secret: Theory and Applications of Ring Signatures , 2001, Essays in Memory of Shimon Even.
[5] Joseph K. Liu,et al. Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups (Extended Abstract) , 2004, ACISP.
[6] Dan Boneh,et al. Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles , 2004, IACR Cryptol. ePrint Arch..
[7] Kazue Sako,et al. k-Times Anonymous Authentication (Extended Abstract) , 2004, ASIACRYPT.
[8] Joseph K. Liu,et al. Separable Linkable Threshold Ring Signatures , 2004, INDOCRYPT.
[9] Reihaneh Safavi-Naini,et al. Dynamic k-Times Anonymous Authentication , 2005, ACNS.
[10] Yevgeniy Dodis,et al. A Verifiable Random Function with Short Proofs and Keys , 2005, Public Key Cryptography.
[11] Yi Mu,et al. Constant-Size Dynamic k-TAA , 2006, SCN.
[12] Joseph K. Liu,et al. Enhanced Security Models and a Generic Construction Approach for Linkable Ring Signature , 2006, Int. J. Found. Comput. Sci..
[13] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[14] Lan Nguyen. Efficient Dynamic k-Times Anonymous Authentication , 2006, VIETCRYPT.
[15] Kazue Sako,et al. k-Times Anonymous Authentication with a Constant Proving Cost , 2006, Public Key Cryptography.
[16] Tsz Hon Yuen,et al. Ring signatures without random oracles , 2006, ASIACCS '06.
[17] Jan Camenisch,et al. How to win the clonewars: efficient periodic n-times anonymous authentication , 2006, CCS '06.
[18] Brent Waters,et al. Full-Domain Subgroup Hiding and Constant-Size Group Signatures , 2007, Public Key Cryptography.
[19] Kari Barlow,et al. Like technology from an advanced alien culture: Google apps for education at ASU , 2007, SIGUCCS '07.
[20] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[21] Rafail Ostrovsky,et al. Attribute-based encryption with non-monotonic access structures , 2007, CCS '07.
[22] Yi Mu,et al. Revocable Ring Signature , 2007, Journal of Computer Science and Technology.
[23] Reihaneh Safavi-Naini,et al. Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems , 2009, AFRICACRYPT.
[24] Liqun Chen,et al. Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices , 2010, ISC.
[25] Allison Bishop,et al. Decentralizing Attribute-Based Encryption , 2011, IACR Cryptol. ePrint Arch..
[26] Joseph K. Liu,et al. A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract) , 2010, ProvSec.
[27] Tsz Hon Yuen,et al. Threshold ring signature without random oracles , 2011, ASIACCS '11.
[28] Tsz Hon Yuen,et al. Forward Secure Ring Signature without Random Oracles , 2011, ICICS.
[29] Manoj Prabhakaran,et al. Attribute-Based Signatures , 2011, CT-RSA.
[30] Robert H. Deng,et al. HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing , 2012, IEEE Transactions on Information Forensics and Security.
[31] Tsz Hon Yuen,et al. Forward Secure Attribute-Based Signatures , 2012, ICICS.
[32] Joseph K. Liu,et al. Realizing Fully Secure Unrestricted ID-Based Ring Signature in the Standard Model Based on HIBE , 2013, IEEE Transactions on Information Forensics and Security.
[33] Tsz Hon Yuen,et al. Secure ID-based linkable and revocable-iff-linked ring signature with constant-size construction , 2013, Theor. Comput. Sci..
[34] P. MuraliKrishna,et al. SECURE SCHEMES FOR SECRET SHARING AND KEY DISTRIBUTION USING PELL'S EQUATION , 2013 .
[35] Tsz Hon Yuen,et al. Efficient Linkable and/or Threshold Ring Signature Without Random Oracles , 2013, Comput. J..
[36] Joseph K. Liu,et al. New Insight to Preserve Online Survey Accuracy and Privacy in Big Data Era , 2014, ESORICS.
[37] Tatsuaki Okamoto,et al. Efficient Attribute-Based Signatures for Non-Monotone Predicates in the Standard Model , 2014, IEEE Transactions on Cloud Computing.
[38] Joseph K. Liu,et al. Linkable Ring Signature with Unconditional Anonymity , 2014, IEEE Transactions on Knowledge and Data Engineering.