Attribute-based Encryption with Non-Monotonic Access Structures Supporting Fine-Grained Attribute Revocation in M-healthcare
暂无分享,去创建一个
Zhiguang Qin | Yang Zhao | Pengcheng Fan | Hu Xiong | Haoting Cai | Yang Zhao | Z. Qin | H. Xiong | Pengcheng Fan | H. Cai
[1] Jin Li,et al. Computationally Efficient Ciphertext-Policy Attribute-Based Encryption with Constant-Size Ciphertexts , 2014, ProvSec.
[2] Tatsuaki Okamoto,et al. Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption , 2010, IACR Cryptol. ePrint Arch..
[3] Qiang Li,et al. An attribute based encryption scheme with fine-grained attribute revocation , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).
[4] Melissa Chase,et al. Multi-authority Attribute Based Encryption , 2007, TCC.
[5] Kyung-Yong Chung,et al. PHR Based Life Health Index Mobile Service Using Decision Support Model , 2016, Wirel. Pers. Commun..
[6] Ming Li,et al. Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settings , 2010, SecureComm.
[7] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[8] Kim-Kwang Raymond Choo,et al. Fine-grained Database Field Search Using Attribute-Based Encryption for E-Healthcare Clouds , 2016, Journal of Medical Systems.
[9] Milan Petkovic,et al. Ciphertext-Policy Attribute-Based Broadcast Encryption Scheme , 2011, Communications and Multimedia Security.
[10] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[11] Krishnamurthy Vidyasankar,et al. A secure revocable personal health record system with policy-based fine-grained access control , 2015, 2015 13th Annual Conference on Privacy, Security and Trust (PST).
[12] Vipul Goyal,et al. Identity-based encryption with efficient revocation , 2008, IACR Cryptol. ePrint Arch..
[13] Hideki Imai,et al. Conjunctive Broadcast and Attribute-Based Encryption , 2009, Pairing.
[14] Qinyi Li,et al. An Expressive Decentralizing KP-ABE Scheme with Constant-Size Ciphertext , 2013, Int. J. Netw. Secur..
[15] Rafail Ostrovsky,et al. Attribute-based encryption with non-monotonic access structures , 2007, CCS '07.
[16] Min-Shiang Hwang,et al. A Survey of Public Auditing for Shared Data Storage with User Revocation in Cloud Computing , 2016, Int. J. Netw. Secur..
[17] Zhiguang Qin,et al. Analysis and Improvement of Patient Self-controllable Multi-level Privacy-preserving Cooperative Authentication Scheme , 2015, Int. J. Netw. Secur..
[18] Allison Bishop,et al. Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption , 2010, EUROCRYPT.
[19] Joseph K. Liu,et al. Secure sharing of Personal Health Records in cloud computing: Ciphertext-Policy Attribute-Based Signcryption , 2015, Future Gener. Comput. Syst..
[20] Katsuyuki Takashima,et al. Expressive Attribute-Based Encryption with Constant-Size Ciphertexts from the Decisional Linear Assumption , 2020, SCN.
[21] Vinod Vaikuntanathan,et al. Attribute-based encryption for circuits , 2013, STOC '13.
[22] H. Raghav Rao,et al. Factors influencing online health information search: An empirical analysis of a national cancer-related survey , 2014, Decis. Support Syst..
[23] Jiguo Li,et al. Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation , 2014, International Journal of Information Security.
[24] Hu Xiong,et al. Enabling Telecare Medical Information Systems With Strong Authentication and Anonymity , 2017, IEEE Access.
[25] Rui Guo,et al. Provably-Secure Certificateless Key Encapsulation Mechanism for e-Healthcare System , 2015, Int. J. Netw. Secur..
[26] Brent Waters,et al. Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions , 2009, IACR Cryptol. ePrint Arch..
[27] L. Gatzoulis,et al. Wearable and Portable eHealth Systems , 2007, IEEE Engineering in Medicine and Biology Magazine.
[28] Yalin Chen,et al. On the Privacy of "User Efficient Recoverable Off-Line E-Cash Scheme with Fast Anonymity Revoking" , 2015, Int. J. Netw. Secur..
[29] Ling Cheung,et al. Provably secure ciphertext policy ABE , 2007, CCS '07.
[30] Hui Li,et al. Fine-grained Access Control and Revocation for Sharing Data on Clouds , 2012, 2012 IEEE 26th International Parallel and Distributed Processing Symposium Workshops & PhD Forum.
[31] Jun Zhou,et al. PSMPA: Patient Self-Controllable and Multi-Level Privacy-Preserving Cooperative Authentication in Distributedm-Healthcare Cloud Computing System , 2015, IEEE Transactions on Parallel and Distributed Systems.
[32] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[33] Xiaojun Zhang,et al. An Authenticated Privacy-preserving Attribute Matchmaking Protocol for Mobile Social Networks , 2015 .
[34] Yao Zheng,et al. Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption , 2019, IEEE Transactions on Parallel and Distributed Systems.
[35] Pieter H. Hartel,et al. Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application , 2009, WISA.
[36] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[37] Brent Waters,et al. Secure attribute-based systems , 2006, CCS '06.
[38] Oscar Garcia Morchon,et al. Efficient distributed security for wireless medical sensor networks , 2008, 2008 International Conference on Intelligent Sensors, Sensor Networks and Information Processing.