An efficient and traceable KP-ABS scheme with untrusted attribute authority in cloud computing
暂无分享,去创建一个
[1] Guo Shaniqng,et al. Attribute-based Signature Scheme , 2008, 2008 International Conference on Information Security and Assurance (isa 2008).
[2] Duncan S. Wong,et al. Secure Outsourced Attribute-Based Signatures , 2014, IEEE Transactions on Parallel and Distributed Systems.
[3] Javier Herranz,et al. Short Attribute-Based Signatures for Threshold Predicates , 2012, CT-RSA.
[4] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[5] Nuttapong Attrapadung,et al. Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts , 2011, Public Key Cryptography.
[6] Yiming Zhao,et al. Efficient Traceable Attribute-Based Signature , 2014, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications.
[7] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[8] C. Pandu Rangan,et al. Attribute Based Signatures for Bounded Multi-level Threshold Circuits , 2010, EuroPKI.
[9] Manoj Prabhakaran,et al. Attribute-Based Signatures: Achieving Attribute-Privacy and Collusion-Resistance , 2008, IACR Cryptol. ePrint Arch..
[10] Zhiqian Xu,et al. Anonymous User Revocation for Using Attribute-Based Signature in Cloud Computing , 2014, 2014 IEEE 6th International Conference on Cloud Computing Technology and Science.
[11] Jin Li,et al. Hidden attribute-based signatures without anonymity revocation , 2010, Inf. Sci..
[12] Joe Kilian. Advances in Cryptology — CRYPTO 2001 , 2001, Lecture Notes in Computer Science.
[13] Xiaofeng Wang,et al. Mediated attribute based signature scheme supporting key revocation , 2012, 2012 8th International Conference on Information Science and Digital Content Technology (ICIDT2012).
[14] Paz Morillo,et al. Revocable Attribute-Based Signatures with Adaptive Security in the Standard Model , 2011, AFRICACRYPT.
[15] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[16] Jianfeng Ma,et al. Attribute Based Multi-signature Scheme in the Standard Model , 2013, 2013 Ninth International Conference on Computational Intelligence and Security.
[17] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[18] Manoj Prabhakaran,et al. Attribute-Based Signatures , 2011, CT-RSA.
[19] Tatsuaki Okamoto,et al. Decentralized Attribute-Based Signatures , 2013, Public Key Cryptography.
[20] Reihaneh Safavi-Naini,et al. Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems , 2009, AFRICACRYPT.