Anonymous Attribute-Based Encryption with Large Universe and Threshold Access Structures
暂无分享,去创建一个
[1] Jin Li,et al. Anonymous attribute-based encryption supporting efficient decryption test , 2013, ASIA CCS '13.
[2] Jonathan Katz,et al. Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products , 2008, Journal of Cryptology.
[3] Zhen Liu,et al. Practical Ciphertext-Policy Attribute-Based Encryption: Traitor Tracing, Revocation, and Large Universe , 2015, ACNS.
[4] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[5] Zhen Liu,et al. Blackbox traceable CP-ABE: how to catch people leaking their keys by selling decryption devices on ebay , 2013, CCS.
[6] Jianfeng Ma,et al. Fine-Grained Access Control System Based on Outsourced Attribute-Based Encryption , 2013, ESORICS.
[7] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[8] Robert H. Deng,et al. Fully Secure Cipertext-Policy Hiding CP-ABE , 2011, ISPEC.
[9] Jin Li,et al. Privacy-Aware Attribute-Based Encryption with User Accountability , 2009, ISC.
[10] Rafail Ostrovsky,et al. Attribute-based encryption with non-monotonic access structures , 2007, CCS '07.
[11] Robert H. Deng,et al. Expressive CP-ABE with partially hidden access structures , 2012, ASIACCS '12.
[12] Brent Waters,et al. Conjunctive, Subset, and Range Queries on Encrypted Data , 2007, TCC.
[13] Xiaolei Dong,et al. Traceable CP-ABE with Short Ciphertexts: How to Catch People Selling Decryption Devices on eBay Efficiently , 2016, ESORICS.
[14] Kazuki Yoneyama,et al. Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures , 2008, ACNS.
[15] Jin Li,et al. Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing , 2017, Inf. Sci..
[16] G. Ravi,et al. Attribute Based Encryption With Verifiable Outsourced Decryption , 2014 .
[17] Javier Herranz,et al. Constant Size Ciphertexts in Threshold Attribute-Based Encryption , 2010, Public Key Cryptography.
[18] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[19] Sherman S. M. Chow,et al. Improving privacy and security in multi-authority attribute-based encryption , 2009, CCS.
[20] Jin Li,et al. Anonymous attribute-based proxy re-encryption for access control in cloud computing , 2016, Secur. Commun. Networks.
[21] Jin Li,et al. Securely Outsourcing Attribute-Based Encryption with Checkability , 2014, IEEE Transactions on Parallel and Distributed Systems.
[22] Joseph K. Liu,et al. A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing , 2015, Future Gener. Comput. Syst..
[23] Sean W. Smith,et al. Attribute-Based Publishing with Hidden Credentials and Hidden Policies , 2007, NDSS.
[24] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[25] Ling Cheung,et al. Provably secure ciphertext policy ABE , 2007, CCS '07.
[26] Cong Wang,et al. Attribute based data sharing with attribute revocation , 2010, ASIACCS '10.