Attribute-Based Encryption from Identity-Based Encryption
暂无分享,去创建一个
[1] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[2] Xiaohui Liang,et al. Provably secure and efficient bounded ciphertext policy attribute based encryption , 2009, ASIACCS '09.
[3] Robert H. Deng,et al. Fully Secure Cipertext-Policy Hiding CP-ABE , 2011, ISPEC.
[4] Rafail Ostrovsky,et al. Attribute-based encryption with non-monotonic access structures , 2007, CCS '07.
[5] Wenjing Lou,et al. Attribute-based content distribution with hidden policy , 2008, 2008 4th Workshop on Secure Network Protocols.
[6] Zhiwei Wang,et al. CP-ABE with Hidden Policy from Waters Efficient Construction , 2016, Int. J. Distributed Sens. Networks.
[7] Stefan Katzenbeisser,et al. Hiding the Policy in Cryptographic Access Control , 2011, STM.
[8] Qing Wu,et al. Adaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroups , 2012, Math. Comput. Model..
[9] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization , 2011, Public Key Cryptography.
[10] Aggelos Kiayias,et al. Lower Bounds for Private Broadcast Encryption , 2012, Information Hiding.
[11] Brent Waters,et al. Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles) , 2006, CRYPTO.
[12] Ratna Dutta,et al. Recipient Anonymous Ciphertext-Policy Attribute Based Encryption , 2013, ICISS.
[13] Fuchun Guo,et al. CP-ABE With Constant-Size Keys for Lightweight Devices , 2014, IEEE Transactions on Information Forensics and Security.
[14] K. Kuppusamy,et al. Privacy Preserving Ciphertext Policy Attribute Based Encryption , 2010, CNSA.
[15] Ling Cheung,et al. Provably secure ciphertext policy ABE , 2007, CCS '07.
[16] Cécile Delerablée,et al. Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys , 2007, ASIACRYPT.
[17] Guomin Yang,et al. POSTER: Efficient Ciphertext Policy Attribute Based Encryption Under Decisional Linear Assumption , 2014, CCS.
[18] Devesh C. Jinwala,et al. A Novel Approach for Searchable CP-ABE with Hidden Ciphertext-Policy , 2014, ICISS.
[19] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[20] Jin Li,et al. Efficient attribute-based data sharing in mobile clouds , 2016, Pervasive Mob. Comput..
[21] Kazuki Yoneyama,et al. Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures , 2008, ACNS.
[22] Umesh Chandra Yadav,et al. Ciphertext-policy attribute-based encryption with hiding access structure , 2015, 2015 IEEE International Advance Computing Conference (IACC).
[23] Guomin Yang,et al. Hidden Ciphertext Policy Attribute-Based Encryption Under Standard Assumptions , 2016, IEEE Transactions on Information Forensics and Security.
[24] Nishant Doshi,et al. Hidden Access Structure Ciphertext Policy Attribute Based Encryption with Constant Length Ciphertext , 2011, ADCONS.
[25] Cheng Chen,et al. Efficient Ciphertext Policy Attribute-Based Encryption with Constant-Size Ciphertext and Constant Computation-Cost , 2011, ProvSec.
[26] Cheng Chen,et al. Fully Secure Attribute-Based Systems with Short Ciphertexts/Signatures and Threshold Access Structures , 2013, CT-RSA.
[27] Zhibin Zhou,et al. On efficient ciphertext-policy attribute based encryption and broadcast encryption: extended abstract , 2010, CCS '10.
[28] Amit Sahai,et al. Bounded Ciphertext Policy Attribute Based Encryption , 2008, ICALP.
[29] Yanli Ren,et al. Efficient Ciphertext-Policy Attribute Based Encryption with Hidden Policy , 2012, IDCS.
[30] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[31] Craig Gentry,et al. Practical Identity-Based Encryption Without Random Oracles , 2006, EUROCRYPT.
[32] Fugeng Zeng,et al. Attribute-based encryption with hidden threshold access structure , 2017 .
[33] Yang Wang,et al. A Tree-Based CP-ABE Scheme with Hidden Policy Supporting Secure Data Sharing in Cloud Computing , 2013, 2013 International Conference on Advanced Cloud and Big Data.
[34] K. Kuppusamy,et al. Ciphertext Policy Attribute based Encryption with anonymous access policy , 2010, ArXiv.
[35] Atsuko Miyaji,et al. A ciphertext-policy attribute-based encryption scheme with constant ciphertext length , 2010, Int. J. Appl. Cryptogr..
[36] Javier Herranz,et al. Constant Size Ciphertexts in Threshold Attribute-Based Encryption , 2010, Public Key Cryptography.
[37] Bo Lang,et al. A CP-ABE scheme with hidden policy and its application in cloud computing , 2016, Int. J. Cloud Comput..
[38] P. MuraliKrishna,et al. SECURE SCHEMES FOR SECRET SHARING AND KEY DISTRIBUTION USING PELL'S EQUATION , 2013 .
[39] Cheng Chen,et al. Threshold Ciphertext Policy Attribute-Based Encryption with Constant Size Ciphertexts , 2012, ACISP.
[40] Jin Li,et al. Computationally Efficient Ciphertext-Policy Attribute-Based Encryption with Constant-Size Ciphertexts , 2014, ProvSec.
[41] Nuttapong Attrapadung,et al. Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts , 2011, Public Key Cryptography.
[42] Phuong Viet Xuan Tran,et al. Efficient Ciphertext-Policy ABE with constant ciphertext length , 2012, 2012 7th International Conference on Computing and Convergence Technology (ICCCT).