Outsourced Multi-authority ABE with White-Box Traceability for Cloud-IoT
暂无分享,去创建一个
Jiguo Yu | Chunqiang Hu | Suhui Liu | Mengmeng Li | Jiguo Yu | Suhui Liu | Chun-qiang Hu | Mengmeng Li
[1] Sherman S. M. Chow,et al. Improving privacy and security in multi-authority attribute-based encryption , 2009, CCS.
[2] Jiguo Yu,et al. Edge Computing Security: State of the Art and Challenges , 2019, Proceedings of the IEEE.
[3] Kai Zhang,et al. Efficient large-universe multi-authority ciphertext-policy attribute-based encryption with white-box traceability , 2017, Science China Information Sciences.
[4] Dan Boneh,et al. Short Signatures Without Random Oracles , 2004, EUROCRYPT.
[5] Jian Shen,et al. Verifiable Outsourced Decryption of Attribute-Based Encryption with Constant Ciphertext Length , 2017, Secur. Commun. Networks.
[6] Jun Zhang,et al. High-rate and high-capacity measurement-device-independent quantum key distribution with Fibonacci matrix coding in free space , 2018, Science China Information Sciences.
[7] Jiguo Yu,et al. BC-SABE: Blockchain-Aided Searchable Attribute-Based Encryption for Cloud-IoT , 2020, IEEE Internet of Things Journal.
[8] Xiaofeng Liao,et al. Body Area Network Security: A Fuzzy Attribute-Based Signcryption Scheme , 2013, IEEE Journal on Selected Areas in Communications.
[9] Hongbo Zhu,et al. Traceable Ciphertext-Policy Attribute-Based Encryption with Verifiable Outsourced Decryption in eHealth Cloud , 2018, Wirel. Commun. Mob. Comput..
[10] Matthew Green,et al. Outsourcing the Decryption of ABE Ciphertexts , 2011, USENIX Security Symposium.
[11] Rainer Steinwandt,et al. Multi-authority attribute-based encryption with honest-but-curious central authority , 2012, Int. J. Comput. Math..
[12] Abderrazak Jemai,et al. PAbAC: A Privacy Preserving Attribute based Framework for Fine Grained Access Control in Clouds , 2016, SECRYPT.
[13] Tao Xiang,et al. Secure and Efficient Data Collection and Storage of IoT in Smart Ocean , 2020, IEEE Internet of Things Journal.
[14] Allison Bishop,et al. Decentralizing Attribute-Based Encryption , 2011, IACR Cryptol. ePrint Arch..
[15] Arwa Alrawais,et al. R²PEDS: A Recoverable and Revocable Privacy-Preserving Edge Data Sharing Scheme , 2020, IEEE Internet of Things Journal.
[16] Hugo Krawczyk,et al. Relaxing Chosen-Ciphertext Security , 2003, CRYPTO.
[17] M. Laurent-Maknavicius,et al. PHOABE: Securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IoT , 2018, Comput. Networks.
[18] Jiguo Yu,et al. LH-ABSC: A Lightweight Hybrid Attribute-Based Signcryption Scheme for Cloud-Fog-Assisted IoT , 2020, IEEE Internet of Things Journal.
[19] Ian Miers,et al. Charm: a framework for rapidly prototyping cryptosystems , 2013, Journal of Cryptographic Engineering.
[20] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization , 2011, Public Key Cryptography.
[21] Jie Cui,et al. Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage , 2016, Soft Computing.
[22] Xiaoyun Wang,et al. How to Break MD5 and Other Hash Functions , 2005, EUROCRYPT.
[23] Reihaneh Safavi-Naini,et al. Attribute-based encryption without key cloning , 2012, Int. J. Appl. Cryptogr..
[24] Hong Li,et al. Coin Hopping Attack in Blockchain-Based IoT , 2019, IEEE Internet of Things Journal.
[25] Zhipeng Cai,et al. Privacy-Preserved Data Sharing Towards Multiple Parties in Industrial IoTs , 2020, IEEE Journal on Selected Areas in Communications.