A Revocable Outsourcing Attribute-Based Encryption Scheme
暂无分享,去创建一个
Zoe L. Jiang | Siu-Ming Yiu | Zechao Liu | Ruoqing Zhang | Xuan Wang | Lucas C. K. Hui | Junbin Fang | L. Hui | S. Yiu | Xuan Wang | Z. L. Jiang | Jun-bin Fang | Zechao Liu | Ruoqing Zhang
[1] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization , 2011, Public Key Cryptography.
[2] Jin Li,et al. Identity-Based Encryption with Outsourced Revocation in Cloud Computing , 2015, IEEE Transactions on Computers.
[3] Brent Waters,et al. Secure attribute-based systems , 2010, J. Comput. Secur..
[4] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[5] Matthew Green,et al. Outsourcing the Decryption of ABE Ciphertexts , 2011, USENIX Security Symposium.
[6] Jaap-Henk Hoepman,et al. Fast revocation of attribute-based credentials for both users and verifiers , 2015, Comput. Secur..
[7] Jin Li,et al. Securely Outsourcing Attribute-Based Encryption with Checkability , 2014, IEEE Transactions on Parallel and Distributed Systems.
[8] Vipul Goyal,et al. Identity-based encryption with efficient revocation , 2008, IACR Cryptol. ePrint Arch..
[9] Jessica Staddon,et al. A content-driven access control system , 2008, IDtrust '08.
[10] Brent Waters,et al. Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption , 2012, IACR Cryptol. ePrint Arch..
[11] Dong Kun Noh,et al. Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems , 2011, IEEE Transactions on Parallel and Distributed Systems.
[12] Hugo Krawczyk,et al. Relaxing Chosen-Ciphertext Security , 2003, CRYPTO.
[13] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[14] Robert H. Deng,et al. Attribute-Based Encryption With Efficient Verifiable Outsourced Decryption , 2015, IEEE Transactions on Information Forensics and Security.
[15] Robert H. Deng,et al. Server-Aided Revocable Identity-Based Encryption , 2015, ESORICS.
[16] Cong Wang,et al. Attribute based data sharing with attribute revocation , 2010, ASIACCS '10.
[17] Hideki Imai,et al. Conjunctive Broadcast and Attribute-Based Encryption , 2009, Pairing.
[18] Zoe L. Jiang,et al. Fully Secure Ciphertext-Policy Attribute Based Encryption with Security Mediator , 2014, ICICS.
[19] Rafail Ostrovsky,et al. Attribute-based encryption with non-monotonic access structures , 2007, CCS '07.