Pairing-based CP-ABE with constant-size ciphertexts and secret keys for cloud environment
暂无分享,去创建一个
Kim-Kwang Raymond Choo | Muhammad Khurram Khan | Saru Kumari | Vanga Odelu | Ashok Kumar Das | Y. Sreenivasa Rao | Y. S. Rao | M. Khan | S. Kumari | A. Das | Vanga Odelu
[1] Ling Cheung,et al. Provably secure ciphertext policy ABE , 2007, CCS '07.
[2] Kim-Kwang Raymond Choo,et al. Distributed denial of service (DDoS) resilience in cloud: Review and conceptual cloud DDoS mitigation framework , 2016, J. Netw. Comput. Appl..
[3] Rafail Ostrovsky,et al. Attribute-based encryption with non-monotonic access structures , 2007, CCS '07.
[4] Mauro Conti,et al. Updaticator: Updating Billions of Devices by an Efficient, Scalable and Secure Software Update Distribution over Untrusted Cache-enabled Networks , 2014, ESORICS.
[5] Allison Bishop,et al. Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption , 2010, EUROCRYPT.
[6] Kim-Kwang Raymond Choo,et al. Forensic-by-Design Framework for Cyber-Physical Cloud Systems , 2016, IEEE Cloud Computing.
[7] Bala Srinivasan,et al. Secure sharing and searching for real-time video data in mobile cloud , 2015, IEEE Network.
[8] Joseph K. Liu,et al. Extended Proxy-Assisted Approach: Achieving Revocable Fine-Grained Encryption of Cloud Data , 2015, ESORICS.
[9] Zhibin Zhou,et al. On efficient ciphertext-policy attribute based encryption and broadcast encryption: extended abstract , 2010, CCS '10.
[10] Nishant Doshi,et al. Fully secure ciphertext policy attribute-based encryption with constant length ciphertext and faster decryption , 2014, Secur. Commun. Networks.
[11] Jin Li,et al. Computationally Efficient Ciphertext-Policy Attribute-Based Encryption with Constant-Size Ciphertexts , 2014, ProvSec.
[12] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[13] Nuttapong Attrapadung,et al. Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts , 2011, Public Key Cryptography.
[14] Atsuko Miyaji,et al. A ciphertext-policy attribute-based encryption scheme with constant ciphertext length , 2009, Int. J. Appl. Cryptogr..
[15] Cheng Chen,et al. Fully Secure Attribute-Based Systems with Short Ciphertexts/Signatures and Threshold Access Structures , 2013, CT-RSA.
[16] Kim-Kwang Raymond Choo. Mobile Cloud Storage Users , 2014, IEEE Cloud Computing.
[17] Tatsuaki Okamoto,et al. Secure Integration of Asymmetric and Symmetric Encryption Schemes , 1999, Journal of Cryptology.
[18] Fuchun Guo,et al. CP-ABE With Constant-Size Keys for Lightweight Devices , 2014, IEEE Transactions on Information Forensics and Security.
[19] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[20] Joseph K. Liu,et al. On Lightweight Security Enforcement in Cyber-Physical Systems , 2015, LightSec.
[21] Kim-Kwang Raymond Choo,et al. Cloud Forensic Technical Challenges and Solutions: A Snapshot , 2014, IEEE Cloud Computing.
[22] Kim-Kwang Raymond Choo,et al. An adversary model to evaluate DRM protection of video contents on iOS devices , 2016, Comput. Secur..
[23] Kim-Kwang Raymond Choo,et al. Exfiltrating data from Android devices , 2015, Comput. Secur..
[24] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization , 2011, Public Key Cryptography.
[25] Allison Bishop,et al. New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques , 2012, CRYPTO.
[26] Atsuko Miyaji,et al. A ciphertext-policy attribute-based encryption scheme with constant ciphertext length , 2010, Int. J. Appl. Cryptogr..
[27] Javier Herranz,et al. Constant Size Ciphertexts in Threshold Attribute-Based Encryption , 2010, Public Key Cryptography.
[28] Kim-Kwang Raymond Choo,et al. A survey of information security incident handling in the cloud , 2015, Comput. Secur..