Attribute-Based Access Control with Constant-Size Ciphertext in Cloud Computing
暂无分享,去创建一个
Yang Xiang | Geng Yang | Wei Teng | Ting Zhang | Dongyang Wang | Yang Xiang | Geng Yang | Wei-Tun Teng | Dongyang Wang | Ting Zhang
[1] Dorothy E. Denning,et al. A lattice model of secure information flow , 1976, CACM.
[2] K. J. Bma. Integrity considerations for secure computer systems , 1977 .
[3] Zhenfu Cao,et al. Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption , 2012, Inf. Sci..
[4] Ivan Stojmenovic,et al. DACC: Distributed Access Control in Clouds , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.
[5] Pieter H. Hartel,et al. Efficient and Provable Secure Ciphertext-Policy Attribute-Based Encryption Schemes , 2008, ISPEC.
[6] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[7] Cheng Chen,et al. Threshold Ciphertext Policy Attribute-Based Encryption with Constant Size Ciphertexts , 2012, ACISP.
[8] Jie Wu,et al. Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers , 2011, Comput. Secur..
[9] D. Elliott Bell,et al. Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .
[10] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[11] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[12] Melissa Chase,et al. Multi-authority Attribute Based Encryption , 2007, TCC.
[13] Josep Domingo-Ferrer,et al. Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts , 2014, Inf. Sci..
[14] Kefei Chen,et al. Key updating technique in identity-based encryption , 2011, Inf. Sci..
[15] Rakesh Bobba,et al. Attribute-Sets: A Practically Motivated Enhancement to Attribute-Based Encryption , 2009, ESORICS.
[16] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[17] Amit Sahai,et al. Bounded Ciphertext Policy Attribute Based Encryption , 2008, ICALP.
[18] Zhenfu Cao,et al. Multi-use and unidirectional identity-based proxy re-encryption schemes , 2010, Inf. Sci..
[19] Atsuko Miyaji,et al. A ciphertext-policy attribute-based encryption scheme with constant ciphertext length , 2010, Int. J. Appl. Cryptogr..
[20] Javier Herranz,et al. Constant Size Ciphertexts in Threshold Attribute-Based Encryption , 2010, Public Key Cryptography.
[21] Robert H. Deng,et al. HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing , 2012, IEEE Transactions on Information Forensics and Security.
[22] Liqun Chen,et al. Identity-based key agreement protocols from pairings , 2017, International Journal of Information Security.
[23] William L. Maxwell,et al. On the implementation of security measures in information systems , 1972, CACM.
[24] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[25] Dan Boneh,et al. Hierarchical Identity Based Encryption with Constant Size Ciphertext , 2005, EUROCRYPT.
[26] Ben Lynn,et al. Toward Hierarchical Identity-Based Encryption , 2002, EUROCRYPT.
[27] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[28] Cong Wang,et al. Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.
[29] Rong Hao,et al. Forward-secure identity-based signature: Security notions and construction , 2011, Inf. Sci..
[30] Matthew Green,et al. Identity-Based Proxy Re-encryption , 2007, ACNS.
[31] Josep Domingo-Ferrer,et al. Provably secure one-round identity-based authenticated asymmetric group key agreement protocol , 2011, Inf. Sci..