Smart Grid Data Security using Practical CP-ABE with Obfuscated Policy and Outsourcing Decryption
暂无分享,去创建一个
Ankit Pradhan | Padmalochan Bera | Kamalakanta Sethi | R. Punith | Kamalakanta Sethi | P. Bera | Ankit Pradhan | R. Punith
[1] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[2] Jiguo Yu,et al. CP_ABSC: An attribute-based signcryption scheme to secure multicast communications in smart grids , 2018, Math. Found. Comput..
[3] Ian Miers,et al. Charm: a framework for rapidly prototyping cryptosystems , 2013, Journal of Cryptographic Engineering.
[4] Junbeom Hur,et al. Attribute-Based Secure Data Sharing with Hidden Policies in Smart Grid , 2013, IEEE Transactions on Parallel and Distributed Systems.
[5] Dong Kun Noh,et al. Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems , 2011, IEEE Transactions on Parallel and Distributed Systems.
[6] Brent Waters,et al. Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption , 2012, IACR Cryptol. ePrint Arch..
[7] P. MuraliKrishna,et al. SECURE SCHEMES FOR SECRET SHARING AND KEY DISTRIBUTION USING PELL'S EQUATION , 2013 .
[8] Jianfeng Ma,et al. Provably secure unbounded multi-authority ciphertext-policy attribute-based encryption , 2015, Secur. Commun. Networks.
[9] K. Kuppusamy,et al. An expressive and provably secure Ciphertext-Policy Attribute-Based Encryption , 2014, Inf. Sci..
[10] Rafail Ostrovsky,et al. Attribute-based encryption with non-monotonic access structures , 2007, CCS '07.
[11] Houda Daki,et al. Big Data management in smart grid: concepts, requirements and implementation , 2017, Journal of Big Data.
[12] Xiaojiang Du,et al. Achieving Efficient and Secure Data Acquisition for Cloud-Supported Internet of Things in Smart Grid , 2017, IEEE Internet of Things Journal.
[13] Brent Waters,et al. Practical constructions and new proof methods for large universe attribute-based encryption , 2013, CCS.
[14] Jie Wu,et al. Hierarchical attribute-based encryption for fine-grained access control in cloud storage services , 2010, CCS '10.
[15] Peng Ning,et al. False data injection attacks against state estimation in electric power grids , 2009, CCS.
[16] Xiuhua Li,et al. A Secure and Scalable Data Communication Scheme in Smart Grids , 2018, Wirel. Commun. Mob. Comput..
[17] Mohammad Reza Aref,et al. An efficient and secure data sharing in Smart Grid: Ciphertext-policy attribute-based signcryption , 2017, 2017 Iranian Conference on Electrical Engineering (ICEE).
[18] Zhibin Zhou,et al. Efficient Privacy-Preserving Ciphertext-Policy Attribute Based-Encryption and Broadcast Encryption , 2015, IEEE Transactions on Computers.
[19] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[20] Allison Bishop,et al. Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption , 2010, EUROCRYPT.
[21] Brent Waters,et al. Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption , 2015, Financial Cryptography.
[22] Jie Wu,et al. Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers , 2011, Comput. Secur..
[23] Jung Hee Cheon,et al. Beyond the Limitation of Prime-Order Bilinear Groups, and Round Optimal Blind Signatures , 2012, TCC.
[24] Amit Sahai,et al. Bounded Ciphertext Policy Attribute Based Encryption , 2008, ICALP.
[25] Allison Bishop,et al. Decentralizing Attribute-Based Encryption , 2011, IACR Cryptol. ePrint Arch..
[26] Danna Zhou,et al. d. , 1934, Microbial pathogenesis.
[27] Brent Waters,et al. Attribute-Based Encryption with Fast Decryption , 2013, Public Key Cryptography.
[28] Melissa Chase,et al. Multi-authority Attribute Based Encryption , 2007, TCC.
[29] Kent E. Seamons,et al. Concealing complex policies with hidden credentials , 2004, CCS '04.
[30] Ian Goldberg,et al. Pairing-Based Onion Routing , 2007, Privacy Enhancing Technologies.
[31] Allison Bishop,et al. New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques , 2012, CRYPTO.
[32] Zhiwei Wang,et al. Attribute-Based Online/Offline Encryption in Smart Grid , 2015, 2015 24th International Conference on Computer Communication and Networks (ICCCN).