A Survey of Research Progress and Development Tendency of Attribute-Based Encryption
暂无分享,去创建一个
[1] Muttukrishnan Rajarajan,et al. Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption , 2012, IEEE Transactions on Parallel and Distributed Systems.
[2] Vipul Goyal,et al. Identity-based encryption with efficient revocation , 2008, IACR Cryptol. ePrint Arch..
[3] Amit Sahai,et al. Bounded Ciphertext Policy Attribute Based Encryption , 2008, ICALP.
[4] Hwajeong Seo,et al. Attribute-based Proxy Re-encryption with a Constant Number of Pairing Operations , 2012, J. Inform. and Commun. Convergence Engineering.
[5] Xiaohui Liang,et al. Provably secure and efficient bounded ciphertext policy attribute based encryption , 2009, ASIACCS '09.
[6] Liaojun Pang,et al. Improved multicast key management of Chinese wireless local area network security standard , 2012, IET Commun..
[7] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization , 2011, Public Key Cryptography.
[8] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[9] Jin Li,et al. New Ciphertext-Policy Attribute-Based Access Control with Efficient Revocation , 2013, ICT-EurAsia.
[10] CaoZhenfu,et al. Secure threshold multi authority attribute based encryption without a central authority , 2008, Inf. Sci..
[11] Allison Bishop,et al. Unbounded HIBE and Attribute-Based Encryption , 2011, IACR Cryptol. ePrint Arch..
[12] Hugo Krawczyk,et al. Secure Distributed Key Generation for Discrete-Log Based Cryptosystems , 1999, Journal of Cryptology.
[13] Melissa Chase,et al. Multi-authority Attribute Based Encryption , 2007, TCC.
[14] Zhong Chen,et al. Ciphertext Policy Attribute-Based Proxy Re-encryption , 2010, ICICS.
[15] Jiang Zhang,et al. A Ciphertext Policy Attribute-Based Encryption Scheme without Pairings , 2011, Inscrypt.
[16] Allison Bishop,et al. Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption , 2010, EUROCRYPT.
[17] Moni Naor,et al. Revocation and Tracing Schemes for Stateless Receivers , 2001, CRYPTO.
[18] Liaojun Pang,et al. nMIBAS: A Novel Multi-Receiver ID-Based Anonymous Signcryption with Decryption Fairness , 2013, Comput. Informatics.
[19] Jie Wu,et al. Hierarchical attribute-based encryption for fine-grained access control in cloud storage services , 2010, CCS '10.
[20] Keying Li,et al. Matrix Access structure Policy used in Attribute-Based Proxy Re-encryption , 2013, ArXiv.
[21] Ali Miri,et al. Using Threshold Attribute-based Encryption for Practical Biometric-based Access Control , 2005, Int. J. Netw. Secur..
[22] Rainer Steinwandt,et al. Multi-authority attribute-based encryption with honest-but-curious central authority , 2012, Int. J. Comput. Math..
[23] Nicola Zannone,et al. Enforcing Access Control in Virtual Organizations Using Hierarchical Attribute-Based Encryption , 2012, 2012 Seventh International Conference on Availability, Reliability and Security.
[24] Shanqing Guo,et al. Attribute-based re-encryption scheme in the standard model , 2008, Wuhan University Journal of Natural Sciences.
[25] M. Mambo,et al. Proxy Cryptosystems: Delegation of the Power to Decrypt Ciphertexts (Special Section on Cryptography and Information Security) , 1997 .
[26] Matthew Green,et al. Identity-Based Proxy Re-encryption , 2007, ACNS.
[27] Stefan Katzenbeisser,et al. Distributed Attribute-Based Encryption , 2009, ICISC.
[28] Jin Li,et al. A2BE: Accountable Attribute-Based Encryption for Abuse Free Access Control , 2009, IACR Cryptol. ePrint Arch..
[29] Hideki Imai,et al. Attribute-Based Encryption Supporting Direct/Indirect Revocation Modes , 2009, IMACC.
[30] Kazuki Yoneyama,et al. Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures , 2008, ACNS.
[31] Allison Bishop,et al. Decentralizing Attribute-Based Encryption , 2011, IACR Cryptol. ePrint Arch..
[32] Jin Li,et al. Defending against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems , 2009, SecureComm.
[33] Rafail Ostrovsky,et al. Fast Digital Identity Revocation (Extended Abstract) , 1998, CRYPTO.
[34] Dong Kun Noh,et al. Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems , 2011, IEEE Transactions on Parallel and Distributed Systems.
[35] Jie Wu,et al. Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers , 2011, Comput. Secur..
[36] Kefei Chen,et al. Accountable authority key policy attribute-based encryption , 2012, Science China Information Sciences.
[37] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[38] Matt Blaze,et al. Divertible Protocols and Atomic Proxy Cryptography , 1998, EUROCRYPT.
[39] Nuttapong Attrapadung,et al. Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts , 2011, Public Key Cryptography.
[40] Hugo Krawczyk,et al. Robust Threshold DSS Signatures , 1996, Inf. Comput..
[41] Xiaodong Lin,et al. Ciphertext Policy Attribute Based Encryption with Efficient Revocation , 2009 .
[42] Pieter H. Hartel,et al. Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application , 2009, WISA.
[43] Pieter H. Hartel,et al. Efficient and Provable Secure Ciphertext-Policy Attribute-Based Encryption Schemes , 2008, ISPEC.
[44] AtenieseGiuseppe,et al. Improved proxy re-encryption schemes with applications to secure distributed storage , 2006 .
[45] Cheng-Chi Lee,et al. A Survey on Attribute-based Encryption Schemes of Access Control in Cloud Environments , 2013, Int. J. Netw. Secur..
[46] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[47] Benoît Libert,et al. Adaptive-ID Secure Revocable Identity-Based Encryption , 2009, CT-RSA.
[48] Hideki Imai,et al. Conjunctive Broadcast and Attribute-Based Encryption , 2009, Pairing.
[49] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[50] Wu,et al. Adaptively Secure Attribute-Based Encryption Supporting Attribute Revocation , 2012 .
[51] Hideki Imai,et al. Dual-Policy Attribute Based Encryption , 2009, ACNS.
[52] Dongqing Xie,et al. Multi-authority ciphertext-policy attribute-based encryption with accountability , 2011, ASIACCS '11.
[53] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[54] Brent Waters,et al. Secure attribute-based systems , 2006, CCS '06.
[55] Cong Wang,et al. Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.
[56] Matthew Green,et al. Improved proxy re-encryption schemes with applications to secure distributed storage , 2006, TSEC.
[57] Xiaohui Liang,et al. Attribute based proxy re-encryption with delegating capabilities , 2009, ASIACCS '09.
[58] Ming Gu,et al. Hierarchical Attribute-Set Based Encryption for Scalable, Flexible and Fine-Grained Access Control in Cloud Computing , 2011, ISPEC.
[59] Allison Bishop,et al. Revocation Systems with Very Small Private Keys , 2010, 2010 IEEE Symposium on Security and Privacy.
[60] Willy Susilo,et al. A Ciphertext-Policy Attribute-Based Proxy Re-encryption with Chosen-Ciphertext Security , 2013, 2013 5th International Conference on Intelligent Networking and Collaborative Systems.
[61] Sherman S. M. Chow,et al. Improving privacy and security in multi-authority attribute-based encryption , 2009, CCS.
[62] Tsz Hon Yuen,et al. Fully Secure Multi-authority Ciphertext-Policy Attribute-Based Encryption without Random Oracles , 2011, ESORICS.
[63] Atsuko Miyaji,et al. A ciphertext-policy attribute-based encryption scheme with constant ciphertext length , 2009, Int. J. Appl. Cryptogr..
[64] Jessica Staddon,et al. A content-driven access control system , 2008, IDtrust '08.
[65] Ling Cheung,et al. Provably secure ciphertext policy ABE , 2007, CCS '07.
[66] Cong Wang,et al. Attribute based data sharing with attribute revocation , 2010, ASIACCS '10.
[67] S. Katzenbeisser,et al. ON MULTI-AUTHORITY CIPHERTEXT-POLICY ATTRIBUTE-BASED ENCRYPTION , 2009 .
[68] Dongyao Ji,et al. Verifiable Attribute Based Encryption , 2010, Int. J. Netw. Secur..
[69] Jin Li,et al. Privacy-Aware Attribute-Based Encryption with User Accountability , 2009, ISC.
[70] Rafail Ostrovsky,et al. Attribute-based encryption with non-monotonic access structures , 2007, CCS '07.