Fine-grained multi-authority access control in IoT-enabled mHealth

[1]  Yao Wang,et al.  Full Verifiability for Outsourced Decryption in Attribute Based Encryption , 2020, IEEE Transactions on Services Computing.

[2]  Jinguang Han,et al.  VOD-ADAC: Anonymous Distributed Fine-Grained Access Control Protocol with Verifiable Outsourced Decryption in Public Cloud , 2020, IEEE Transactions on Services Computing.

[3]  Huaqun Wang,et al.  Incentive and Unconditionally Anonymous Identity-Based Public Provable Data Possession , 2019, IEEE Transactions on Services Computing.

[4]  Lei Chen,et al.  Enhancing Privacy and Availability for Data Clustering in Intelligent Electrical Service of IoT , 2019, IEEE Internet of Things Journal.

[5]  Hang Shi,et al.  A Feature-Based Learning System for Internet of Things Applications , 2019, IEEE Internet of Things Journal.

[6]  Dongxi Liu,et al.  An Identity-Based Signcryption on Lattice without Trapdoor , 2019, J. Univers. Comput. Sci..

[7]  Robert H. Deng,et al.  Blockchain based efficient and robust fair payment for outsourcing services in cloud computing , 2018, Inf. Sci..

[8]  Robert H. Deng,et al.  Lightweight Break-Glass Access Control System for Healthcare Internet-of-Things , 2018, IEEE Transactions on Industrial Informatics.

[9]  Xiaochun Cheng,et al.  M-SSE: An Effective Searchable Symmetric Encryption With Enhanced Security for Mobile Devices , 2018, IEEE Access.

[10]  Jin Li,et al.  Multi-authority fine-grained access control with accountability and its application in cloud , 2018, J. Netw. Comput. Appl..

[11]  Robert H. Deng,et al.  Security and Privacy in Smart Health: Efficient Policy-Hiding Attribute-Based Access Control , 2018, IEEE Internet of Things Journal.

[12]  Jianfeng Ma,et al.  A remotely keyed file encryption scheme under mobile cloud computing , 2018, J. Netw. Comput. Appl..

[13]  Tong Li,et al.  Normal Cloud Model-Based Algorithm for Multi-Attribute Trusted Cloud Service Selection , 2018, IEEE Access.

[14]  Brij Bhooshan Gupta,et al.  A Practical Public Key Encryption Scheme Based on Learning Parity With Noise , 2018, IEEE Access.

[15]  Samaher Al-Janabi,et al.  Survey of main challenges (security and privacy) in wireless body area networks for healthcare applications , 2017 .

[16]  Jin Li,et al.  Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing , 2017, Inf. Sci..

[17]  Hao Yue,et al.  RAAC: Robust and Auditable Access Control With Multiple Attribute Authorities for Public Cloud Storage , 2017, IEEE Transactions on Information Forensics and Security.

[18]  Hao Wang,et al.  New directly revocable attribute-based encryption scheme and its application in cloud storage environment , 2016, Cluster Computing.

[19]  Hyunsoo Kwon,et al.  Efficient Attribute-Based Secure Data Sharing with Hidden Policies and Traceability in Mobile Health Networks , 2016, Mob. Inf. Syst..

[20]  Jianfeng Ma,et al.  Secure, efficient and revocable multi-authority access control system in cloud storage , 2016, Comput. Secur..

[21]  Yogachandran Rahulamathavan,et al.  User Collusion Avoidance Scheme for Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption , 2016, IEEE Transactions on Computers.

[22]  Jianfeng Ma,et al.  Provably secure unbounded multi-authority ciphertext-policy attribute-based encryption , 2015, Secur. Commun. Networks.

[23]  Jin Li,et al.  A Hybrid Cloud Approach for Secure Authorized Deduplication , 2015, IEEE Transactions on Parallel and Distributed Systems.

[24]  Robert H. Deng,et al.  Attribute-Based Encryption With Efficient Verifiable Outsourced Decryption , 2015, IEEE Transactions on Information Forensics and Security.

[25]  Jianfeng Ma,et al.  Large universe decentralized key-policy attribute-based encryption , 2015, Secur. Commun. Networks.

[26]  Jin Li,et al.  Identity-Based Encryption with Outsourced Revocation in Cloud Computing , 2015, IEEE Transactions on Computers.

[27]  Jin Li,et al.  Securely Outsourcing Attribute-Based Encryption with Checkability , 2014, IEEE Transactions on Parallel and Distributed Systems.

[28]  Wu He,et al.  Internet of Things in Industries: A Survey , 2014, IEEE Transactions on Industrial Informatics.

[29]  Robert H. Deng,et al.  Attribute-Based Encryption With Verifiable Outsourced Decryption , 2013, IEEE Transactions on Information Forensics and Security.

[30]  Tsz Hon Yuen,et al.  Fully Secure Multi-authority Ciphertext-Policy Attribute-Based Encryption without Random Oracles , 2011, ESORICS.

[31]  Matthew Green,et al.  Outsourcing the Decryption of ABE Ciphertexts , 2011, USENIX Security Symposium.

[32]  Angelo De Caro,et al.  jPBC: Java pairing based cryptography , 2011, 2011 IEEE Symposium on Computers and Communications (ISCC).

[33]  Dongqing Xie,et al.  Multi-authority ciphertext-policy attribute-based encryption with accountability , 2011, ASIACCS '11.

[34]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization , 2011, Public Key Cryptography.

[35]  Allison Bishop,et al.  Decentralizing Attribute-Based Encryption , 2011, IACR Cryptol. ePrint Arch..

[36]  Allison Bishop,et al.  Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption , 2010, EUROCRYPT.

[37]  Cong Wang,et al.  Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.

[38]  Sherman S. M. Chow,et al.  Improving privacy and security in multi-authority attribute-based encryption , 2009, CCS.

[39]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[40]  Melissa Chase,et al.  Multi-authority Attribute Based Encryption , 2007, TCC.

[41]  Brent Waters,et al.  Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.

[42]  Brent Waters,et al.  Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.

[43]  A. Beimel Secure schemes for secret sharing and key distribution , 1996 .