Transformation between Attribute-Based Encryption and Key-Aggregate Cryptosystem
暂无分享,去创建一个
[1] Rafail Ostrovsky,et al. Attribute-based encryption with non-monotonic access structures , 2007, CCS '07.
[2] R. Kalaiselvi,et al. SCALABLE AND SECURE SHARING OF PERSONAL HEALTH RECORDS IN CLOUD COMPUTING , 2016 .
[3] Atsuko Miyaji,et al. A ciphertext-policy attribute-based encryption scheme with constant ciphertext length , 2010, Int. J. Appl. Cryptogr..
[4] Yao Zheng,et al. Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption , 2019, IEEE Transactions on Parallel and Distributed Systems.
[5] Gaikwad Prajakta,et al. Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage , 2015 .
[6] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[7] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[8] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[9] Fuchun Guo,et al. CP-ABE With Constant-Size Keys for Lightweight Devices , 2014, IEEE Transactions on Information Forensics and Security.
[10] Changji Wang,et al. An Efficient Key-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length , 2013 .
[11] Ling Cheung,et al. Provably secure ciphertext policy ABE , 2007, CCS '07.
[12] Vanga Odelu,et al. Design of a new CP-ABE with constant-size secret keys for lightweight devices using elliptic curve cryptography , 2016, Secur. Commun. Networks.
[13] Wu Qiuxin,et al. A generic construction of ciphertext-policy attribute-based encryption supporting attribute revocation , 2014, China Communications.
[14] Xiaohui Liang,et al. Provably secure and efficient bounded ciphertext policy attribute based encryption , 2009, ASIACCS '09.
[15] Milan Petkovic,et al. Secure management of personal health records by applying attribute-based encryption , 2009, Proceedings of the 6th International Workshop on Wearable, Micro, and Nano Technologies for Personalized Health.
[16] Chih-Wen Lin,et al. Attribute-Based Encryption from Identity-Based Encryption , 2017, IACR Cryptol. ePrint Arch..
[17] Alexander W. Dent,et al. A Brief History of Provably-Secure Public-Key Encryption , 2008, AFRICACRYPT.
[18] P. MuraliKrishna,et al. SECURE SCHEMES FOR SECRET SHARING AND KEY DISTRIBUTION USING PELL'S EQUATION , 2013 .
[19] Kim-Kwang Raymond Choo,et al. Expressive CP-ABE Scheme for Mobile Devices in IoT Satisfying Constant-Size Keys and Ciphertexts , 2017, IEEE Access.
[20] Nuttapong Attrapadung,et al. Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts , 2011, Public Key Cryptography.
[21] David Pointcheval,et al. Homomorphic-Policy Attribute-Based Key Encapsulation Mechanisms , 2016, IACR Cryptol. ePrint Arch..
[22] Mihir Bellare,et al. Randomness Re-use in Multi-recipient Encryption Schemeas , 2003, Public Key Cryptography.
[23] Javier Herranz. Attribute-based encryption implies identity-based encryption , 2017, IET Inf. Secur..
[24] Amit Sahai,et al. Bounded Ciphertext Policy Attribute Based Encryption , 2008, ICALP.
[25] Jie Wu,et al. Hierarchical attribute-based encryption for fine-grained access control in cloud storage services , 2010, CCS '10.