Improving Security and Efficiency in Attribute-Based Data Sharing
暂无分享,去创建一个
[1] Ling Cheung,et al. Provably secure ciphertext policy ABE , 2007, CCS '07.
[2] Cong Wang,et al. Attribute based data sharing with attribute revocation , 2010, ASIACCS '10.
[3] Pieter H. Hartel,et al. Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application , 2009, WISA.
[4] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[5] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[6] Vipul Goyal,et al. Identity-based encryption with efficient revocation , 2008, IACR Cryptol. ePrint Arch..
[7] Amit Sahai,et al. Bounded Ciphertext Policy Attribute Based Encryption , 2008, ICALP.
[8] Rafail Ostrovsky,et al. Attribute-based encryption with non-monotonic access structures , 2007, CCS '07.
[9] Sherman S. M. Chow. Removing Escrow from Identity-Based Encryption , 2009, Public Key Cryptography.
[10] Hovav Shacham,et al. Randomizable Proofs and Delegatable Anonymous Credentials , 2009, CRYPTO.
[11] Sherman S. M. Chow,et al. Improving privacy and security in multi-authority attribute-based encryption , 2009, CCS.
[12] Ian Goldberg,et al. Pairing-Based Onion Routing , 2007, Privacy Enhancing Technologies.
[13] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[14] David Hutchison,et al. A survey of key management for secure group communication , 2003, CSUR.
[15] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[16] Brent Waters,et al. Secure attribute-based systems , 2006, CCS '06.
[17] Xiaohui Liang,et al. Provably secure and efficient bounded ciphertext policy attribute based encryption , 2009, ASIACCS '09.
[18] Hideki Imai,et al. Conjunctive Broadcast and Attribute-Based Encryption , 2009, Pairing.
[19] Sushil Jajodia,et al. Over-encryption: Management of Access Control Evolution on Outsourced Data , 2007, VLDB.
[20] Allison Bishop,et al. Revocation Systems with Very Small Private Keys , 2010, 2010 IEEE Symposium on Security and Privacy.
[21] K. C. Almeroth,et al. Multicast group behavior in the Internet's multicast backbone (MBone) , 1997 .
[22] Jessica Staddon,et al. A content-driven access control system , 2008, IDtrust '08.