A CP-ABE scheme based on multi-authority in hybrid clouds for mobile devices
暂无分享,去创建一个
Haibo Hong | Jun Shao | Mande Xie | Yingying Ruan | Haibo Hong | Jun Shao | Mande Xie | Yingying Ruan
[1] Qiaoyan Wen,et al. Decentralized, Revocable and Verifiable Attribute-Based Encryption in Hybrid Cloud System , 2019, Wirel. Pers. Commun..
[2] Jin Li,et al. Privacy-preserving data utilization in hybrid clouds , 2014, Future Gener. Comput. Syst..
[3] Reihaneh Safavi-Naini,et al. An Efficient Signature Scheme from Bilinear Pairings and Its Applications , 2004, Public Key Cryptography.
[4] Dong Kun Noh,et al. Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems , 2011, IEEE Transactions on Parallel and Distributed Systems.
[5] Jianfeng Ma,et al. VKSE-MO: verifiable keyword search over encrypted data in multi-owner settings , 2017, Science China Information Sciences.
[6] Kui Ren,et al. Attribute-based fine-grained access control with efficient revocation in cloud storage systems , 2013, ASIA CCS '13.
[7] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[8] Wenhua Wang,et al. Multi‐authority attribute‐based encryption scheme with constant‐size ciphertexts and user revocation , 2019, Concurr. Comput. Pract. Exp..
[9] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization , 2011, Public Key Cryptography.
[10] Matthew Green,et al. Outsourcing the Decryption of ABE Ciphertexts , 2011, USENIX Security Symposium.
[11] Allison Bishop,et al. Decentralizing Attribute-Based Encryption , 2011, IACR Cryptol. ePrint Arch..
[12] Qiaoyan Wen,et al. Flexible CP-ABE Based Access Control on Encrypted Data for Mobile Users in Hybrid Cloud System , 2017, Journal of Computer Science and Technology.
[13] Feng Lin,et al. Efficient decentralized multi-authority attribute based encryption for mobile cloud data storage , 2019, J. Netw. Comput. Appl..
[14] Jonathan Katz,et al. Chosen-Ciphertext Security from Identity-Based Encryption , 2004, SIAM J. Comput..
[15] Cong Wang,et al. Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.
[16] Zhen Liu,et al. On Efficiently Transferring the Linear Secret-Sharing Scheme Matrix in Ciphertext-Policy Attribute-Based Encryption , 2010, IACR Cryptol. ePrint Arch..
[17] Dongyao Ji,et al. Verifiable Attribute Based Encryption , 2010, Int. J. Netw. Secur..
[18] Melissa Chase,et al. Multi-authority Attribute Based Encryption , 2007, TCC.
[19] CaoZhenfu,et al. Secure threshold multi authority attribute based encryption without a central authority , 2008, Inf. Sci..
[20] XiaoFeng Wang,et al. Sedic: privacy-aware data intensive computing on hybrid clouds , 2011, CCS '11.
[21] Wei Wei,et al. Efficient Data Access Control With Fine-Grained Data Protection in Cloud-Assisted IIoT , 2021, IEEE Internet of Things Journal.
[22] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[23] Zongpeng Li,et al. Cost-minimizing dynamic migration of content distribution services into hybrid clouds , 2012, 2012 Proceedings IEEE INFOCOM.
[24] Sherman S. M. Chow,et al. Improving privacy and security in multi-authority attribute-based encryption , 2009, CCS.
[25] Stefan Katzenbeisser,et al. Distributed Attribute-Based Encryption , 2009, ICISC.