Rainbow: reliable personally identifiable information retrieval across multi-cloud
暂无分享,去创建一个
Hui Ma | Rui Zhang | Zishuai Song | Shuzhou Sun | Yansen Xin
[1] Hui Ma,et al. WebCloud: Web-Based Cloud Storage for Secure Data Sharing Across Platforms , 2022, IEEE Transactions on Dependable and Secure Computing.
[2] Joonsang Baek,et al. A Verifiable and Fair Attribute-Based Proxy Re-Encryption Scheme for Data Sharing in Clouds , 2021, IEEE Transactions on Dependable and Secure Computing.
[3] Hui Ma,et al. Server-Aided Fine-Grained Access Control Mechanism with Robust Revocation in Cloud Computing , 2019, IEEE Transactions on Services Computing.
[4] Hui Cui,et al. Server-Aided Revocable Attribute-Based Encryption Resilient to Decryption Key Exposure , 2017, CANS.
[5] Hui Ma,et al. Verifiable and Exculpable Outsourced Attribute-Based Encryption for Access Control in Cloud Computing , 2017, IEEE Transactions on Dependable and Secure Computing.
[6] Robert H. Deng,et al. Server-Aided Revocable Attribute-Based Encryption , 2016, ESORICS.
[7] Qixiang Mei,et al. Generic and Efficient Constructions of Attribute-Based Encryption with Verifiable Outsourced Decryption , 2016, IEEE Transactions on Dependable and Secure Computing.
[8] Rui Zhang,et al. Verifiable attribute-based proxy re-encryption for secure public cloud data sharing , 2016, Secur. Commun. Networks.
[9] Sourav Mukhopadhyay,et al. Adaptively Secure Unrestricted Attribute-Based Encryption with Subset Difference Revocation in Bilinear Groups of Prime Order , 2016, AFRICACRYPT.
[10] Joseph K. Liu,et al. Extended Proxy-Assisted Approach: Achieving Revocable Fine-Grained Encryption of Cloud Data , 2015, ESORICS.
[11] Hui Ma,et al. Revisiting Attribute-Based Encryption With Verifiable Outsourced Decryption , 2015, IEEE Transactions on Information Forensics and Security.
[12] Robert H. Deng,et al. Attribute-Based Encryption With Verifiable Outsourced Decryption , 2013, IEEE Transactions on Information Forensics and Security.
[13] Matthew Green,et al. Outsourcing the Decryption of ABE Ciphertexts , 2011, USENIX Security Symposium.
[14] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization , 2011, Public Key Cryptography.
[15] Hugo Krawczyk,et al. Cryptographic Extraction and Key Derivation: The HKDF Scheme , 2010, IACR Cryptol. ePrint Arch..
[16] Tatsuaki Okamoto,et al. Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption , 2010, IACR Cryptol. ePrint Arch..
[17] Allison Bishop,et al. Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption , 2010, EUROCRYPT.
[18] Hideki Imai,et al. Attribute-Based Encryption Supporting Direct/Indirect Revocation Modes , 2009, IMACC.
[19] Hideki Imai,et al. Conjunctive Broadcast and Attribute-Based Encryption , 2009, Pairing.
[20] Hovav Shacham,et al. Proceedings of the 3rd International Conference Palo Alto on Pairing-Based Cryptography , 2009 .
[21] Rafail Ostrovsky,et al. Attribute-based encryption with non-monotonic access structures , 2007, CCS '07.
[22] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[23] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[24] Paulo S. L. M. Barreto,et al. Pairing-Friendly Elliptic Curves of Prime Order , 2005, Selected Areas in Cryptography.
[25] Dan Boneh,et al. Hierarchical Identity Based Encryption with Constant Size Ciphertext , 2005, EUROCRYPT.
[26] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[27] C. Koch,et al. Library , 2002 .
[28] D. Boneh,et al. Short Signatures from the Weil Pairing , 2001, Journal of Cryptology.
[29] Tal Rabin,et al. Robust sharing of secrets when the dealer is honest or cheating , 1994, JACM.
[30] Torben P. Pedersen. Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing , 1991, CRYPTO.
[31] Matthias Sax. Apache Kafka , 2019, Encyclopedia of Big Data Technologies.
[32] Hilde van der Togt,et al. Publisher's Note , 2003, J. Netw. Comput. Appl..