Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers
暂无分享,去创建一个
Jie Wu | Minyi Guo | Qin Liu | Guojun Wang | Jie Wu | M. Guo | Guojun Wang | Qin Liu
[1] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[2] Cong Wang,et al. Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.
[3] Cong Wang,et al. Attribute based data sharing with attribute revocation , 2010, ASIACCS '10.
[4] Craig Gentry,et al. Hierarchical ID-Based Cryptography , 2002, ASIACRYPT.
[5] Hakan Hacigümüs,et al. Executing SQL over encrypted data in the database-service-provider model , 2002, SIGMOD '02.
[6] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[7] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[8] Rafail Ostrovsky,et al. Attribute-based encryption with non-monotonic access structures , 2007, CCS '07.
[9] Craig Gentry,et al. Hierarchical Identity Based Encryption with Polynomially Many Levels , 2009, TCC.
[10] Qian Wang,et al. Plutus: Scalable Secure File Sharing on Untrusted Storage , 2003, FAST.
[11] Dan Boneh,et al. Hierarchical Identity Based Encryption with Constant Size Ciphertext , 2005, EUROCRYPT.
[12] Stefan Katzenbeisser,et al. Distributed Attribute-Based Encryption , 2009, ICISC.
[13] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[14] Matt Blaze,et al. Divertible Protocols and Atomic Proxy Cryptography , 1998, EUROCRYPT.
[15] Jie Wu,et al. Hierarchical attribute-based encryption for fine-grained access control in cloud storage services , 2010, CCS '10.
[16] Dan Boneh,et al. Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles , 2004, IACR Cryptol. ePrint Arch..
[17] Brent Waters,et al. Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions , 2009, IACR Cryptol. ePrint Arch..
[18] Christian Grothoff,et al. Efficient Sharing of Encrypted Data , 2002, ACISP.
[19] WuJie,et al. Achieving fine-grained access control for secure data sharing on cloud servers , 2011 .
[20] Jie Wu,et al. Achieving fine‐grained access control for secure data sharing on cloud servers , 2011, Concurr. Comput. Pract. Exp..