Multi-Authority Ciphertext Policy Attribute-Based Encryption Scheme on Ideal Lattices
暂无分享,去创建一个
Zoe L. Jiang | Siu-Ming Yiu | Yulin Wu | Zechao Liu | Xuan Wang | S. Yiu | Xuan Wang | Z. L. Jiang | Yulin Wu | Zechao Liu
[1] Zoe L. Jiang,et al. Offline/online attribute‐based encryption with verifiable outsourced decryption , 2017, Concurr. Comput. Pract. Exp..
[2] Zhang Peng,et al. Efficient Attribute-Based Encryption from R-LWE , 2014 .
[3] Berk Sunar,et al. Implementation and Evaluation of a Lattice-Based Key-Policy ABE Scheme , 2017, IEEE Transactions on Information Forensics and Security.
[4] Anirban Basu,et al. Decentralized Ciphertext-Policy Attribute-Based Encryption from Learning with Errors over Rings , 2016, 2016 IEEE Trustcom/BigDataSE/ISPA.
[5] Dan Boneh,et al. Efficient Lattice (H)IBE in the Standard Model , 2010, EUROCRYPT.
[6] Azman Samsudin,et al. Lattice Ciphertext-Policy Attribute-Based encryption from ring-LWE , 2015, 2015 International Symposium on Technology Management and Emerging Technologies (ISTMET).
[7] Yongtao Wang,et al. Lattice Ciphertext Policy Attribute-based Encryption in the Standard Model , 2014, Int. J. Netw. Secur..
[8] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[9] Lihua Liu,et al. A Multi-Authority Key-Policy ABE Scheme from Lattices in Mobile Ad Hoc Networks , 2017, Ad Hoc Sens. Wirel. Networks.
[10] Oded Regev,et al. On lattices, learning with errors, random linear codes, and cryptography , 2005, STOC '05.
[11] Chris Peikert,et al. On Ideal Lattices and Learning with Errors over Rings , 2010, JACM.
[12] Craig Gentry,et al. Trapdoors for hard lattices and new cryptographic constructions , 2008, IACR Cryptol. ePrint Arch..
[13] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization , 2011, Public Key Cryptography.
[14] Xavier Boyen,et al. Attribute-Based Functional Encryption on Lattices , 2013, TCC.
[15] Jiwu Huang,et al. Ciphertext policy attribute-based encryption supporting unbounded attribute space from R-LWE , 2017, KSII Trans. Internet Inf. Syst..
[16] Jing Qin,et al. Multi-Authority Attribute-Based Encryption Scheme from Lattices , 2015, J. Univers. Comput. Sci..
[17] Anirban Basu,et al. Decentralized Ciphertext-Policy Attribute-Based Encryption: A Post-Quantum Construction , 2017, J. Internet Serv. Inf. Secur..
[18] Ron Steinfeld,et al. Efficient Public Key Encryption Based on Ideal Lattices , 2009, ASIACRYPT.
[19] Zhenfeng Zhang,et al. Ciphertext policy attribute-based encryption from lattices , 2012, ASIACCS '12.
[20] Jianfeng Ma,et al. Secure, efficient and revocable multi-authority access control system in cloud storage , 2016, Comput. Secur..
[21] Xiaohua Jia,et al. Attributed-Based Access Control for Multi-authority Systems in Cloud Storage , 2012, 2012 IEEE 32nd International Conference on Distributed Computing Systems.
[22] Vinod Vaikuntanathan,et al. Functional Encryption for Threshold Functions (or Fuzzy IBE) from Lattices , 2012, Public Key Cryptography.
[23] Dan Boneh,et al. Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical IBE , 2010, CRYPTO.
[24] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[25] WangXuan,et al. Practical attribute-based encryption , 2018 .
[26] Cynthia Dwork,et al. A public-key cryptosystem with worst-case/average-case equivalence , 1997, STOC '97.
[27] Allison Bishop,et al. Decentralizing Attribute-Based Encryption , 2011, IACR Cryptol. ePrint Arch..
[28] Brent Waters,et al. Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption , 2012, IACR Cryptol. ePrint Arch..