Patient Controlled Encryption using Key Aggregation with Blowfish Algorithm
暂无分享,去创建一个
[1] Robert H. Deng,et al. Dynamic Secure Cloud Storage with Provenance , 2012, Cryptography and Security.
[2] Sherman S. M. Chow,et al. Improving privacy and security in multi-authority attribute-based encryption , 2009, CCS.
[3] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[4] Robert H. Deng,et al. Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage , 2014, IEEE Transactions on Parallel and Distributed Systems.
[5] Marina Blanton,et al. Dynamic and Efficient Key Management for Access Hierarchies , 2009, TSEC.
[6] Cong Wang,et al. Dynamic Data Operations with Deduplication in Privacy-Preserving Public Auditing for Secure Cloud Storage , 2017, 22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC).
[7] Hovav Shacham,et al. Aggregate and Verifiably Encrypted Signatures from Bilinear Maps , 2003, EUROCRYPT.
[8] Ran Canetti,et al. Chosen-ciphertext secure proxy re-encryption , 2007, CCS '07.
[9] Robert H. Deng,et al. Efficient Unidirectional Proxy Re-Encryption , 2010, AFRICACRYPT.
[10] Robert H. Deng,et al. Conditional Proxy Broadcast Re-Encryption , 2009, ACISP.
[11] Selim G. Akl,et al. Cryptographic solution to a problem of access control in a hierarchy , 1983, TOCS.
[12] Ming Li,et al. Storing Shared Data on the Cloud via Security-Mediator , 2013, 2013 IEEE 33rd International Conference on Distributed Computing Systems.
[13] Fuchun Guo,et al. Identity-Based Encryption: How to Decrypt Multiple Ciphertexts Using a Single Decryption Key , 2007, Pairing.
[14] Eric Horvitz,et al. Patient controlled encryption: ensuring privacy of electronic medical records , 2009, CCSW '09.
[15] Josh Benaloh,et al. Key Compression and its Application to Digital Fingerprinting , 2001 .
[16] Jonathan Katz,et al. Chosen-Ciphertext Security from Identity-Based Encryption , 2006 .
[17] Brent Waters,et al. Practical leakage-resilient identity-based encryption from simple assumptions , 2010, CCS '10.
[18] Rafail Ostrovsky,et al. Attribute-based encryption with non-monotonic access structures , 2007, CCS '07.