Towards Efficient Over-Encryption in Outsourced Databases Using Secret Sharing
暂无分享,去创建一个
[1] Amos Beimel,et al. Secret Sharing with Public Reconstruction , 1998, IEEE Trans. Inf. Theory.
[2] Marina Blanton,et al. Dynamic and Efficient Key Management for Access Hierarchies , 2009, TSEC.
[3] Alberto Ceselli,et al. Modeling and assessing inference exposure in encrypted databases , 2005, TSEC.
[4] Jason Crampton,et al. On key assignment for hierarchical access control , 2006, 19th IEEE Computer Security Foundations Workshop (CSFW'06).
[5] Selim G. Akl,et al. Cryptographic solution to a problem of access control in a hierarchy , 1983, TOCS.
[6] Dan Suciu,et al. Controlling Access to Published Data Using Cryptography , 2003, VLDB.
[7] Adi Shamir,et al. How to share a secret , 1979, CACM.
[8] Amr M. Youssef,et al. Preventing Collusion Attacks on the One-Way Function Tree (OFT) Scheme , 2007, ACNS.
[9] Noga Alon,et al. Efficient Dynamic-Resharing "Verifiable Secret Sharing" Against Mobile Adversary , 1995, ESA.
[10] Gene Tsudik,et al. Tree-based group key agreement , 2004, TSEC.
[11] Philippe Béguin,et al. General Short Computational Secret Sharing Schemes , 1995, EUROCRYPT.
[12] Sushil Jajodia,et al. Over-encryption: Management of Access Control Evolution on Outsourced Data , 2007, VLDB.