Blind Expressive Ciphertext Policy Attribute Based Encryption for Fine Grained Access Control on the Encrypted Data
暂无分享,去创建一个
[1] Siu-Ming Yiu,et al. Oblivious Transfer with Access Control : Realizing Disjunction without Duplication , 2010, Pairing.
[2] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[3] Brent Waters,et al. Secure attribute-based systems , 2006, CCS '06.
[4] Cheng-Chi Lee,et al. A Survey on Attribute-based Encryption Schemes of Access Control in Cloud Environments , 2013, Int. J. Netw. Secur..
[5] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[6] Wei-Pang Yang,et al. An Improved Multi-stage Secret Sharing Scheme Based on the Factorization Problem , 2011, Inf. Technol. Control..
[7] Matthew Green,et al. Blind Identity-Based Encryption and Simulatable Oblivious Transfer , 2007, ASIACRYPT.
[8] Ivan Damgård,et al. Efficient Zero-Knowledge Proofs of Knowledge Without Intractability Assumptions , 2000, Public Key Cryptography.
[9] Allison Bishop,et al. Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption , 2010, EUROCRYPT.
[10] Rafail Ostrovsky,et al. Attribute-based encryption with non-monotonic access structures , 2007, CCS '07.
[11] Min-Shiang Hwang,et al. A Study of Attribute-based Proxy Re-encryption Scheme in Cloud Environments , 2014, Int. J. Netw. Secur..
[12] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization , 2011, Public Key Cryptography.
[13] P. MuraliKrishna,et al. SECURE SCHEMES FOR SECRET SHARING AND KEY DISTRIBUTION USING PELL'S EQUATION , 2013 .
[14] Jan Camenisch,et al. Oblivious transfer with access control , 2009, IACR Cryptol. ePrint Arch..
[15] Chakravarthy Bhagvati,et al. CRT Based Threshold Multi Secret Sharing Scheme , 2014, Int. J. Netw. Secur..
[16] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[17] Torben P. Pedersen. Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing , 1991, CRYPTO.
[18] Matthew Green,et al. Controlling Access to an Oblivious Database Using Stateful Anonymous Credentials , 2009, Public Key Cryptography.
[19] Ling Cheung,et al. Provably secure ciphertext policy ABE , 2007, CCS '07.
[20] Amit Sahai,et al. Bounded Ciphertext Policy Attribute Based Encryption , 2008, ICALP.