A CP-ABE scheme based on multi-authority in hybrid clouds for mobile devices

[1]  Qiaoyan Wen,et al.  Decentralized, Revocable and Verifiable Attribute-Based Encryption in Hybrid Cloud System , 2019, Wirel. Pers. Commun..

[2]  Jin Li,et al.  Privacy-preserving data utilization in hybrid clouds , 2014, Future Gener. Comput. Syst..

[3]  Reihaneh Safavi-Naini,et al.  An Efficient Signature Scheme from Bilinear Pairings and Its Applications , 2004, Public Key Cryptography.

[4]  Dong Kun Noh,et al.  Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems , 2011, IEEE Transactions on Parallel and Distributed Systems.

[5]  Jianfeng Ma,et al.  VKSE-MO: verifiable keyword search over encrypted data in multi-owner settings , 2017, Science China Information Sciences.

[6]  Kui Ren,et al.  Attribute-based fine-grained access control with efficient revocation in cloud storage systems , 2013, ASIA CCS '13.

[7]  Brent Waters,et al.  Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.

[8]  Wenhua Wang,et al.  Multi‐authority attribute‐based encryption scheme with constant‐size ciphertexts and user revocation , 2019, Concurr. Comput. Pract. Exp..

[9]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization , 2011, Public Key Cryptography.

[10]  Matthew Green,et al.  Outsourcing the Decryption of ABE Ciphertexts , 2011, USENIX Security Symposium.

[11]  Allison Bishop,et al.  Decentralizing Attribute-Based Encryption , 2011, IACR Cryptol. ePrint Arch..

[12]  Qiaoyan Wen,et al.  Flexible CP-ABE Based Access Control on Encrypted Data for Mobile Users in Hybrid Cloud System , 2017, Journal of Computer Science and Technology.

[13]  Feng Lin,et al.  Efficient decentralized multi-authority attribute based encryption for mobile cloud data storage , 2019, J. Netw. Comput. Appl..

[14]  Jonathan Katz,et al.  Chosen-Ciphertext Security from Identity-Based Encryption , 2004, SIAM J. Comput..

[15]  Cong Wang,et al.  Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.

[16]  Zhen Liu,et al.  On Efficiently Transferring the Linear Secret-Sharing Scheme Matrix in Ciphertext-Policy Attribute-Based Encryption , 2010, IACR Cryptol. ePrint Arch..

[17]  Dongyao Ji,et al.  Verifiable Attribute Based Encryption , 2010, Int. J. Netw. Secur..

[18]  Melissa Chase,et al.  Multi-authority Attribute Based Encryption , 2007, TCC.

[19]  CaoZhenfu,et al.  Secure threshold multi authority attribute based encryption without a central authority , 2008, Inf. Sci..

[20]  XiaoFeng Wang,et al.  Sedic: privacy-aware data intensive computing on hybrid clouds , 2011, CCS '11.

[21]  Wei Wei,et al.  Efficient Data Access Control With Fine-Grained Data Protection in Cloud-Assisted IIoT , 2021, IEEE Internet of Things Journal.

[22]  Brent Waters,et al.  Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.

[23]  Zongpeng Li,et al.  Cost-minimizing dynamic migration of content distribution services into hybrid clouds , 2012, 2012 Proceedings IEEE INFOCOM.

[24]  Sherman S. M. Chow,et al.  Improving privacy and security in multi-authority attribute-based encryption , 2009, CCS.

[25]  Stefan Katzenbeisser,et al.  Distributed Attribute-Based Encryption , 2009, ICISC.