A key-revocable attribute-based encryption for mobile cloud environments
暂无分享,去创建一个
[1] Dan Boneh,et al. The Decision Diffie-Hellman Problem , 1998, ANTS.
[2] Ahmad-Reza Sadeghi,et al. Token-Based Cloud Computing , 2010, TRUST.
[3] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[4] Zhi Li,et al. Cloud computing risk assessment method based on game theory , 2015 .
[5] Reihaneh Safavi-Naini,et al. Attribute-Based Encryption with Key Cloning Protection , 2008, IACR Cryptol. ePrint Arch..
[6] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .
[7] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[8] A. Brauer. On addition chains , 1939 .
[9] 方华. google,我,萨娜 , 2006 .
[10] Michael Scott,et al. On the Efficient Implementation of Pairing-Based Protocols , 2011, IMACC.
[11] Masaaki Shirase,et al. Some Efficient Algorithms for the Final Exponentiation of eta T Pairing , 2007, ISPEC.
[12] Masaaki Shirase,et al. Some Efficient Algorithms for the Final Exponentiation of etaT Pairing , 2006, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[13] Joonsang Baek,et al. Token-Controlled Public Key Encryption , 2005, ISPEC.
[14] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[15] Julio César López-Hernández,et al. High-Speed Parallel Software Implementation of the ηT Pairing , 2010, CT-RSA.
[16] Antoine Joux,et al. A One Round Protocol for Tripartite Diffie–Hellman , 2000, Journal of Cryptology.
[17] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[18] Hugo Krawczyk,et al. Relaxing Chosen-Ciphertext Security , 2003, CRYPTO.
[19] Javier Herranz,et al. A Generic Construction for Token-Controlled Public Key Encryption , 2006, Financial Cryptography.
[20] Allison Bishop,et al. Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption , 2010, EUROCRYPT.
[21] Mihir Bellare,et al. Authenticated Key Exchange Secure against Dictionary Attacks , 2000, EUROCRYPT.
[22] Matthew Green,et al. Outsourcing the Decryption of ABE Ciphertexts , 2011, USENIX Security Symposium.
[23] Zhibin Zhou,et al. Efficient and secure data storage operations for mobile cloud computing , 2012, 2012 8th international conference on network and service management (cnsm) and 2012 workshop on systems virtualiztion management (svm).
[24] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization , 2011, Public Key Cryptography.
[25] Peter Schwabe,et al. New Software Speed Records for Cryptographic Pairings , 2010, LATINCRYPT.
[26] Francisco Rodríguez-Henríquez,et al. High-Speed Software Implementation of the Optimal Ate Pairing over Barreto-Naehrig Curves , 2010, Pairing.