Rainbow: reliable personally identifiable information retrieval across multi-cloud

[1]  Hui Ma,et al.  WebCloud: Web-Based Cloud Storage for Secure Data Sharing Across Platforms , 2022, IEEE Transactions on Dependable and Secure Computing.

[2]  Joonsang Baek,et al.  A Verifiable and Fair Attribute-Based Proxy Re-Encryption Scheme for Data Sharing in Clouds , 2021, IEEE Transactions on Dependable and Secure Computing.

[3]  Hui Ma,et al.  Server-Aided Fine-Grained Access Control Mechanism with Robust Revocation in Cloud Computing , 2019, IEEE Transactions on Services Computing.

[4]  Hui Cui,et al.  Server-Aided Revocable Attribute-Based Encryption Resilient to Decryption Key Exposure , 2017, CANS.

[5]  Hui Ma,et al.  Verifiable and Exculpable Outsourced Attribute-Based Encryption for Access Control in Cloud Computing , 2017, IEEE Transactions on Dependable and Secure Computing.

[6]  Robert H. Deng,et al.  Server-Aided Revocable Attribute-Based Encryption , 2016, ESORICS.

[7]  Qixiang Mei,et al.  Generic and Efficient Constructions of Attribute-Based Encryption with Verifiable Outsourced Decryption , 2016, IEEE Transactions on Dependable and Secure Computing.

[8]  Rui Zhang,et al.  Verifiable attribute-based proxy re-encryption for secure public cloud data sharing , 2016, Secur. Commun. Networks.

[9]  Sourav Mukhopadhyay,et al.  Adaptively Secure Unrestricted Attribute-Based Encryption with Subset Difference Revocation in Bilinear Groups of Prime Order , 2016, AFRICACRYPT.

[10]  Joseph K. Liu,et al.  Extended Proxy-Assisted Approach: Achieving Revocable Fine-Grained Encryption of Cloud Data , 2015, ESORICS.

[11]  Hui Ma,et al.  Revisiting Attribute-Based Encryption With Verifiable Outsourced Decryption , 2015, IEEE Transactions on Information Forensics and Security.

[12]  Robert H. Deng,et al.  Attribute-Based Encryption With Verifiable Outsourced Decryption , 2013, IEEE Transactions on Information Forensics and Security.

[13]  Matthew Green,et al.  Outsourcing the Decryption of ABE Ciphertexts , 2011, USENIX Security Symposium.

[14]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization , 2011, Public Key Cryptography.

[15]  Hugo Krawczyk,et al.  Cryptographic Extraction and Key Derivation: The HKDF Scheme , 2010, IACR Cryptol. ePrint Arch..

[16]  Tatsuaki Okamoto,et al.  Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption , 2010, IACR Cryptol. ePrint Arch..

[17]  Allison Bishop,et al.  Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption , 2010, EUROCRYPT.

[18]  Hideki Imai,et al.  Attribute-Based Encryption Supporting Direct/Indirect Revocation Modes , 2009, IMACC.

[19]  Hideki Imai,et al.  Conjunctive Broadcast and Attribute-Based Encryption , 2009, Pairing.

[20]  Hovav Shacham,et al.  Proceedings of the 3rd International Conference Palo Alto on Pairing-Based Cryptography , 2009 .

[21]  Rafail Ostrovsky,et al.  Attribute-based encryption with non-monotonic access structures , 2007, CCS '07.

[22]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[23]  Brent Waters,et al.  Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.

[24]  Paulo S. L. M. Barreto,et al.  Pairing-Friendly Elliptic Curves of Prime Order , 2005, Selected Areas in Cryptography.

[25]  Dan Boneh,et al.  Hierarchical Identity Based Encryption with Constant Size Ciphertext , 2005, EUROCRYPT.

[26]  Brent Waters,et al.  Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.

[27]  C. Koch,et al.  Library , 2002 .

[28]  D. Boneh,et al.  Short Signatures from the Weil Pairing , 2001, Journal of Cryptology.

[29]  Tal Rabin,et al.  Robust sharing of secrets when the dealer is honest or cheating , 1994, JACM.

[30]  Torben P. Pedersen Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing , 1991, CRYPTO.

[31]  Matthias Sax Apache Kafka , 2019, Encyclopedia of Big Data Technologies.

[32]  Hilde van der Togt,et al.  Publisher's Note , 2003, J. Netw. Comput. Appl..