Survey of attribute based encryption
暂无分享,去创建一个
Hai Jiang | Zhi Qiao | Shuwen Liang | Spencer Davis | Hai Jiang | Zhi Qiao | Shuwen Liang | Spencer Davis
[1] Adi Shamir,et al. How to share a secret , 1979, CACM.
[2] WuJie,et al. Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers , 2011 .
[3] Reihaneh Safavi-Naini,et al. Attribute-Based Encryption with Key Cloning Protection , 2008, IACR Cryptol. ePrint Arch..
[4] Stefan Katzenbeisser,et al. Distributed Attribute-Based Encryption , 2009, ICISC.
[5] Jin Li,et al. A2BE: Accountable Attribute-Based Encryption for Abuse Free Access Control , 2009, IACR Cryptol. ePrint Arch..
[6] Chris Peikert,et al. Public-key cryptosystems from the worst-case shortest vector problem: extended abstract , 2009, STOC '09.
[7] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization , 2011, Public Key Cryptography.
[8] G. Patil. Privacy-Preserving Decentralized Key Policy Attribute-Based Encryption , 2014 .
[9] Dongqing Xie,et al. Multi-authority ciphertext-policy attribute-based encryption with accountability , 2011, ASIACCS '11.
[10] Melissa Chase,et al. Multi-authority Attribute Based Encryption , 2007, TCC.
[11] Brent Waters,et al. Secure attribute-based systems , 2010, J. Comput. Secur..
[12] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[13] Jie Wu,et al. Hierarchical attribute-based encryption for fine-grained access control in cloud storage services , 2010, CCS '10.
[14] Ling Cheung,et al. Provably secure ciphertext policy ABE , 2007, CCS '07.
[15] Javier Herranz,et al. Attribute-based encryption schemes with constant-size ciphertexts , 2012, Theor. Comput. Sci..
[16] S. Katzenbeisser,et al. ON MULTI-AUTHORITY CIPHERTEXT-POLICY ATTRIBUTE-BASED ENCRYPTION , 2009 .
[17] Xiaodong Lin,et al. Ciphertext Policy Attribute Based Encryption with Efficient Revocation , 2009 .
[18] Allison Bishop,et al. Decentralizing Attribute-Based Encryption , 2011, IACR Cryptol. ePrint Arch..
[19] Cheng-Chi Lee,et al. A Survey on Attribute-based Encryption Schemes of Access Control in Cloud Environments , 2013, Int. J. Netw. Secur..
[20] Brent Waters,et al. Attribute-Based Encryption with Fast Decryption , 2013, Public Key Cryptography.
[21] Xiaohui Liang,et al. Secure Threshold Multi Authority Attribute Based Encryption without a Central Authority , 2008, INDOCRYPT.
[22] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[23] Junbeom Hur,et al. Improving Security and Efficiency in Attribute-Based Data Sharing , 2013, IEEE Transactions on Knowledge and Data Engineering.
[24] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[25] Brent Waters,et al. New Constructions and Proof Methods for Large Universe Attribute-Based Encryption , 2012, IACR Cryptol. ePrint Arch..
[26] Yongtao Wang,et al. Lattice Ciphertext Policy Attribute-based Encryption in the Standard Model , 2014, Int. J. Netw. Secur..
[27] Rainer Steinwandt,et al. Multi-authority attribute-based encryption with honest-but-curious central authority , 2012, Int. J. Comput. Math..
[28] Oded Regev,et al. On lattices, learning with errors, random linear codes, and cryptography , 2009, JACM.
[29] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[30] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[31] J. Venkata Subramanian,et al. Improving Security and Efficiency in Attribute-Based Data Sharing , 2012 .
[32] Rafail Ostrovsky,et al. Attribute-based encryption with non-monotonic access structures , 2007, CCS '07.
[33] Dan Boneh,et al. A Secure Signature Scheme from Bilinear Maps , 2003, CT-RSA.
[34] Cong Wang,et al. Enhancing attribute-based encryption with attribute hierarchy , 2009, ICC 2009.
[35] Xavier Boyen,et al. Attribute-Based Functional Encryption on Lattices , 2013, TCC.
[36] Zhenfeng Zhang,et al. Ciphertext policy attribute-based encryption from lattices , 2012, ASIACCS '12.
[37] Antoine Joux. Introduction to Identity-Based Cryptography , 2009, Identity-Based Cryptography.
[38] A. Shamm. Identity-based cryptosystems and signature schemes , 1985 .
[39] Sherman S. M. Chow,et al. Improving privacy and security in multi-authority attribute-based encryption , 2009, CCS.
[40] Tsz Hon Yuen,et al. Fully Secure Multi-authority Ciphertext-Policy Attribute-Based Encryption without Random Oracles , 2011, ESORICS.
[41] Jie Wu,et al. Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers , 2011, Comput. Secur..