Distributed Attribute-based Private Access Control
暂无分享,去创建一个
[1] Michael Gastpar,et al. Private Retrieval, Computing, and Learning: Recent Progress and Future Challenges , 2021, IEEE Journal on Selected Areas in Communications.
[2] Sennur Ulukus,et al. The Capacity of Private Information Retrieval From Heterogeneous Uncoded Caching Databases , 2019, IEEE Transactions on Information Theory.
[3] Hao Wang,et al. Efficient Attribute-Based Encryption with Privacy-Preserving Key Generation and Its Application in Industrial Cloud , 2019, Secur. Commun. Networks.
[4] Sennur Ulukus,et al. Private Information Retrieval from Non-Replicated Databases , 2018, 2019 IEEE International Symposium on Information Theory (ISIT).
[5] Yi Mu,et al. Hidden Ciphertext Policy Attribute-Based Encryption With Fast Decryption for Personal Health Record System , 2019, IEEE Access.
[6] Hua Sun,et al. The Capacity of Symmetric Private Information Retrieval , 2016, 2016 IEEE Globecom Workshops (GC Wkshps).
[7] Hua Sun,et al. The Capacity of Private Information Retrieval , 2017, IEEE Transactions on Information Theory.
[8] Jiguo Li,et al. Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation , 2015, International Journal of Information Security.
[9] Xiang-Yang Li,et al. Privacy preserving cloud data access with multi-authorities , 2012, 2013 Proceedings IEEE INFOCOM.
[10] Jie Wu,et al. Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers , 2011, Comput. Secur..
[11] Melissa Chase,et al. Multi-authority Attribute Based Encryption , 2007, TCC.
[12] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[13] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[14] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.