A Fully Secure KP-ABE Scheme on Prime-Order Bilinear Groups through Selective Techniques
暂无分享,去创建一个
Xiaosong Zhang | Jianbin Gao | Qi Xia | Emmanuel Boateng Sifah | Hu Xia | Kwame Opuni-Boachie Obour Agyekum | Kwame Omono Asamoah | Isaac Amankona Obiri | Xiaosong Zhang | K. Asamoah | Qi Xia | Jianbin Gao | Hu Xia | I. Obiri
[1] Hui Li,et al. Efficient attribute-based encryption with repeated attributes optimization , 2020, International Journal of Information Security.
[2] Avi Wigderson,et al. On span programs , 1993, [1993] Proceedings of the Eigth Annual Structure in Complexity Theory Conference.
[3] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[4] Melissa Chase,et al. Deja Q: Using Dual Systems to Revisit q-Type Assumptions , 2014, IACR Cryptol. ePrint Arch..
[5] Adi Shamir,et al. How to share a secret , 1979, CACM.
[6] Craig Gentry,et al. Hierarchical ID-Based Cryptography , 2002, ASIACRYPT.
[7] Jens Groth,et al. Converting Cryptographic Schemes from Symmetric to Asymmetric Bilinear Groups , 2014, CRYPTO.
[8] Allison Bishop,et al. New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts , 2010, IACR Cryptol. ePrint Arch..
[9] Brent Waters,et al. Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions , 2009, IACR Cryptol. ePrint Arch..
[10] Nuttapong Attrapadung,et al. Dual System Encryption via Doubly Selective Security: Framework, Fully-secure Functional Encryption for Regular Languages, and More , 2014, IACR Cryptol. ePrint Arch..
[11] Ian Miers,et al. Charm: a framework for rapidly prototyping cryptosystems , 2013, Journal of Cryptographic Engineering.
[12] Hao Wang,et al. Efficient Attribute-Based Encryption with Privacy-Preserving Key Generation and Its Application in Industrial Cloud , 2019, Secur. Commun. Networks.