Data Authentication with Privacy Protection
暂无分享,去创建一个
Wanlei Zhou | Xinyi Huang | Jinhua Ma | Yang Xiang | Jianghua Liu | Wanlei Zhou | Xinyi Huang | Yang Xiang | Jinhua Ma | Jianghua Liu
[1] Elaine Shi,et al. Bitter to Better - How to Make Bitcoin a Better Currency , 2012, Financial Cryptography.
[2] Joseph K. Liu,et al. Secure sharing of Personal Health Records in cloud computing: Ciphertext-Policy Attribute-Based Signcryption , 2015, Future Gener. Comput. Syst..
[3] Birgit Pfitzmann,et al. Collision-Free Accumulators and Fail-Stop Signature Schemes Without Trees , 1997, EUROCRYPT.
[4] Daniel Slamanig,et al. A General Framework for Redactable Signatures and New Constructions , 2015, ICISC.
[5] Henrich Christopher Pöhls,et al. Accountable Redactable Signatures , 2015, 2015 10th International Conference on Availability, Reliability and Security.
[6] Douglas M. Blough,et al. Redactable signatures on data with dependencies and their application to personal health records , 2009, WPES '09.
[7] Silvio Micali,et al. How to construct random functions , 1986, JACM.
[8] Shoichi Hirose,et al. Redactable signature scheme for tree-structured data based on Merkle tree , 2013, 2013 International Conference on Security and Cryptography (SECRYPT).
[9] Yasuo Hatano,et al. Efficient signature schemes supporting redaction, pseudonymization, and data deidentification , 2008, ASIACCS '08.
[10] Adi Shamir,et al. How to share a secret , 1979, CACM.
[11] Joachim Posegga,et al. Length-Hiding Redactable Signatures from One-Way Accumulators in O(n) , 2013 .
[12] Elisa Bertino,et al. Privacy-preserving authentication of trees and graphs , 2013, International Journal of Information Security.
[13] Daniel Slamanig,et al. Generalizations and Extensions of Redactable Signatures with Applications to Electronic Healthcare , 2010, Communications and Multimedia Security.
[14] Douglas M. Blough,et al. Verifiable and Redactable Medical Documents , 2012, AMIA.
[15] Wei Wu,et al. An Efficient and Secure Design of Redactable Signature Scheme with Redaction Condition Control , 2017, GPC.
[16] Hideki Imai,et al. Digitally Signed Document Sanitizing Scheme with Disclosure Condition Control , 2005, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[17] Hovav Shacham,et al. Aggregate and Verifiably Encrypted Signatures from Bilinear Maps , 2003, EUROCRYPT.
[18] Hideki Imai,et al. Digitally signed document sanitizing scheme based on bilinear maps , 2006, ASIACCS '06.
[19] Christian Hanser,et al. Revisiting Cryptographic Accumulators, Additional Properties and Relations to other Primitives , 2015, IACR Cryptol. ePrint Arch..
[20] S. Micali,et al. How To Construct Randolli Functions , 1984, FOCS 1984.
[21] Josh Benaloh,et al. One-Way Accumulators: A Decentralized Alternative to Digital Sinatures (Extended Abstract) , 1994, EUROCRYPT.
[22] Nobuo Funabiki,et al. Efficient Proofs of Attributes in Pairing-Based Anonymous Credential System , 2011, PETS.
[23] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[24] Daniel Slamanig,et al. Signer-Anonymous Designated-Verifier Redactable Signatures for Cloud-Based Data Sharing , 2016, CANS.
[25] Silvio Micali,et al. A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks , 1988, SIAM J. Comput..
[26] Li Xu,et al. Protecting Mobile Health Records in Cloud Computing , 2017, ACM Trans. Embed. Comput. Syst..
[27] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[28] Henrich Christopher Pöhls,et al. On Updatable Redactable Signatures , 2014, ACNS.
[29] Dawn Xiaodong Song,et al. Homomorphic Signature Schemes , 2002, CT-RSA.
[30] Ron Steinfeld,et al. Content Extraction Signatures , 2001, ICISC.
[31] Joachim Posegga,et al. Redactable Signatures for Independent Removal of Structure and Content , 2012, ISPEC.
[32] Stefan Katzenbeisser,et al. Redactable Signatures for Tree-Structured Data: Definitions and Constructions , 2010, ACNS.
[33] Yuliang Zheng,et al. A Hierarchical Extraction Policy for content extraction signatures , 2004, International Journal on Digital Libraries.
[34] Yu-Fang Chung,et al. Redactable Signatures for Signed CDA Documents , 2012, Journal of Medical Systems.
[35] Jia Xu,et al. Short Redactable Signatures Using Random Trees , 2009, CT-RSA.
[36] Avi Wigderson,et al. On span programs , 1993, [1993] Proceedings of the Eigth Annual Structure in Complexity Theory Conference.
[37] Yuliang Zheng,et al. Grouping Verifiable Content for Selective Disclosure , 2003, ACISP.