Adaptively secure certificate-based broadcast encryption and its application to cloud storage service
暂无分享,去创建一个
Jiguo Li | Yichen Zhang | Yang Lu | Liqing Chen | Jiguo Li | Yichen Zhang | Yang Lu | Liqing Chen
[1] Jiguo Li,et al. Efficient Identity-Based Provable Multi-Copy Data Possession in Multi-Cloud Storage , 2019, IEEE Transactions on Cloud Computing.
[2] Qing Wu,et al. Adaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroups , 2012, Math. Comput. Model..
[3] Ping Wang,et al. Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound , 2018, IEEE Transactions on Dependable and Secure Computing.
[4] Jiguo Li,et al. Anonymous Certificate-Based Broadcast Encryption With Personalized Messages , 2020, IEEE Transactions on Broadcasting.
[5] Xiaolei Dong,et al. Auditable $\sigma $ -Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing , 2018, IEEE Transactions on Information Forensics and Security.
[6] Jiguo Li,et al. Adaptively secure efficient broadcast encryption with constant-size secret key and ciphertext , 2019, Soft Computing.
[7] Jiguo Li,et al. Hierarchical attribute based encryption with continuous leakage-resilience , 2019, Inf. Sci..
[8] Palash Sarkar,et al. Efficient Adaptively Secure IBBE From the SXDH Assumption , 2016, IEEE Transactions on Information Theory.
[9] Jiguo Li,et al. Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing , 2017, IEEE Transactions on Services Computing.
[10] Geong Sen Poh,et al. Attribute Based Encryption with Privacy Protection and Accountability for CloudIoT , 2022, IEEE Transactions on Cloud Computing.
[11] Jiguo Li,et al. Remote Data Checking With a Designated Verifier in Cloud Storage , 2020, IEEE Systems Journal.
[12] Qiaoyan Wen,et al. Adaptively Secure Broadcast Encryption With Constant Ciphertexts , 2016, IEEE Transactions on Broadcasting.
[13] Jian Shen,et al. Key-policy attribute-based encryption against continual auxiliary input leakage , 2019, Inf. Sci..
[14] Jennifer Seberry,et al. Adaptively Secure Identity-Based Broadcast Encryption With a Constant-Sized Ciphertext , 2015, IEEE Transactions on Information Forensics and Security.
[15] Joonsang Baek,et al. Efficient Multi-receiver Identity-Based Encryption and Its Application to Broadcast Encryption , 2005, Public Key Cryptography.
[16] Xiaolei Dong,et al. White-Box Traceable CP-ABE for Cloud Storage Service: How to Catch People Leaking Their Access Credentials Effectively , 2018, IEEE Transactions on Dependable and Secure Computing.
[17] Yang Yang. Broadcast encryption based non-interactive key distribution in MANETs , 2014, J. Comput. Syst. Sci..
[18] Yanli Ren,et al. Fully CCA2 secure identity based broadcast encryption without random oracles , 2009, Inf. Process. Lett..
[19] Ping Wang,et al. On the Challenges in Designing Identity-Based Privacy-Preserving Authentication Schemes for Mobile Devices , 2018, IEEE Systems Journal.
[20] Hao Yan,et al. A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage , 2017, IEEE Transactions on Information Forensics and Security.
[21] David Pointcheval,et al. Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size Ciphertexts or Decryption Keys , 2007, Pairing.
[22] Jiguo Li,et al. Certificateless Public Integrity Checking of Group Shared Data on Cloud Storage , 2018, IEEE Transactions on Services Computing.
[23] Yun Ling,et al. Fine-Grained Two-Factor Protection Mechanism for Data Sharing in Cloud Storage , 2018, IEEE Transactions on Information Forensics and Security.
[24] Jiguo Li,et al. Adaptively Secure Anonymous Identity-based Broadcast Encryption for Data Access Control in Cloud Storage Service , 2019, KSII Trans. Internet Inf. Syst..
[25] Yang Lu,et al. Anonymous certificate-based broadcast encryption with constant decryption cost , 2018, Inf. Sci..
[26] Yang Lu,et al. A pairing-free certificate-based proxy re-encryption scheme for secure data sharing in public clouds , 2016, Future Gener. Comput. Syst..
[27] David Pointcheval,et al. Adaptive CCA broadcast encryption with constant-size secret keys and ciphertexts , 2012, International Journal of Information Security.
[28] Cécile Delerablée,et al. Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys , 2007, ASIACRYPT.
[29] Jeffrey Xu Yu,et al. DeepDirect: Learning Directions of Social Ties with Edge-Based Network Embedding (Extended Abstract) , 2019, 2019 IEEE 35th International Conference on Data Engineering (ICDE).
[30] Brent Waters,et al. Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys , 2005, CRYPTO.
[31] Jiguo Li,et al. Identity-Based Privacy Preserving Remote Data Integrity Checking for Cloud Storage , 2020, IEEE Systems Journal.
[32] Ping Wang,et al. Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity , 2015, Inf. Sci..
[33] Yao Wang,et al. Full Verifiability for Outsourced Decryption in Attribute Based Encryption , 2020, IEEE Transactions on Services Computing.
[34] Chul Sur,et al. Multi-receiver Certificate-Based Encryption and Application to Public Key Broadcast Encryption , 2007 .
[35] Jiguo Li,et al. Identity-based broadcast encryption with continuous leakage resilience , 2018, Inf. Sci..
[36] Jiguo Li,et al. Extended File Hierarchy Access Control Scheme with Attribute-Based Encryption in Cloud Computing , 2019, IEEE Transactions on Emerging Topics in Computing.
[37] Yi Mu,et al. Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-Based Encryption , 2015, IEEE Transactions on Information Forensics and Security.
[38] Yi Mu,et al. Identity-Based Authenticated Broadcast Encryption and Distributed Authenticated Encryption , 2004, ASIAN.
[39] Fangguo Zhang,et al. Fully CCA2 secure identity-based broadcast encryption with black-box accountable authority , 2012, J. Syst. Softw..
[40] Xu An Wang,et al. Cryptanalysis of an identity based broadcast encryption scheme without random oracles , 2011, Inf. Process. Lett..
[41] Dan Boneh,et al. Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles , 2004, IACR Cryptol. ePrint Arch..