PICADOR: End-to-end encrypted Publish-Subscribe information distribution with proxy re-encryption
暂无分享,去创建一个
Cristian Borcea | Kurt Rohloff | Yuriy Polyakov | Arnab Deb Gupta | Gerard W. Ryan | K. Rohloff | C. Borcea | Y. Polyakov | A. D. Gupta
[1] Miguel Castro,et al. SCRIBE: The Design of a Large-Scale Event Notification Infrastructure , 2001, Networked Group Communication.
[2] J. Cheon,et al. An algorithm for NTRU problems and cryptanalysis of the GGH multilinear map without a low-level encoding of zero , 2016, LMS J. Comput. Math..
[3] Craig Gentry,et al. Homomorphic Evaluation of the AES Circuit , 2012, IACR Cryptol. ePrint Arch..
[4] Enuma Orakwue. Private Clouds: Secure Managed Services , 2010, Inf. Secur. J. A Glob. Perspect..
[5] Javier López,et al. NTRUReEncrypt: An Efficient Proxy Re-Encryption Scheme Based on NTRU , 2015, AsiaCCS.
[6] Steve Warren,et al. An open test bed for medical device integration and coordination , 2009, 2009 31st International Conference on Software Engineering - Companion Volume.
[7] Bruno Crispo,et al. Providing confidentiality in content-based publish/subscribe systems , 2010, 2010 International Conference on Security and Cryptography (SECRYPT).
[8] Joud Khoury,et al. P3S: A Privacy Preserving Publish-Subscribe Middleware , 2012, Middleware.
[9] Michael Naehrig,et al. A Comparison of the Homomorphic Encryption Schemes FV and YASHE , 2014, AFRICACRYPT.
[10] Elena Kirshanova,et al. Proxy Re-encryption from Lattices , 2014, Public Key Cryptography.
[11] Aniruddha S. Gokhale,et al. A QoS policy configuration modeling language for publish/subscribe middleware platforms , 2007, DEBS '07.
[12] Elisa Bertino,et al. Efficient privacy preserving content based publish subscribe systems , 2012, SACMAT '12.
[13] Oded Regev,et al. Lattice-Based Cryptography , 2006, CRYPTO.
[14] Steve Warren,et al. A publish-subscribe architecture and component-based programming model for medical device interoperability , 2009, SIGBED.
[15] Mark Linderman,et al. Jini-based publish and subscribe capability , 2002, SPIE ITCom.
[16] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[17] Vinod Vaikuntanathan,et al. On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption , 2012, STOC '12.
[18] M. Girish Chandra,et al. Security and Privacy for Real Time Video Streaming Using Hierarchical Inner Product Encryption Based Publish-Subscribe Architecture , 2016, 2016 30th International Conference on Advanced Information Networking and Applications Workshops (WAINA).
[19] David M. Eyers,et al. Role-based access control for publish/subscribe middleware architectures , 2003, DEBS '03.
[20] Geoffrey C. Fox,et al. A Framework for Secure End-to-End Delivery of Messages in Publish/Subscribe Systems , 2006, 2006 7th IEEE/ACM International Conference on Grid Computing.
[21] Pascal Felber,et al. Thrifty privacy: efficient support for privacy-preserving publish/subscribe , 2012, DEBS.
[22] Vinod Vaikuntanathan,et al. Fast Proxy Re-Encryption for Publish/Subscribe Systems , 2017, IACR Cryptol. ePrint Arch..
[23] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[24] Anne-Marie Kermarrec,et al. The many faces of publish/subscribe , 2003, CSUR.
[25] Chris Peikert,et al. A Toolkit for Ring-LWE Cryptography , 2013, IACR Cryptol. ePrint Arch..
[26] Ron Steinfeld,et al. Making NTRU as Secure as Worst-Case Problems over Ideal Lattices , 2011, EUROCRYPT.
[27] Yi Mu,et al. Towards a Cryptographic Treatment of Publish/Subscribe Systems , 2010, CANS.
[28] Feng-Hao Liu,et al. Various Proxy Re-Encryption Schemes from Lattices , 2016, IACR Cryptol. ePrint Arch..
[29] Giannis F. Marias,et al. Towards Understanding Pure Publish/Subscribe Cryptographic Protocols , 2008, Security Protocols Workshop.
[30] Xavier Boyen,et al. Key-Private Proxy Re-encryption under LWE , 2013, INDOCRYPT.
[31] Matt Blaze,et al. Divertible Protocols and Atomic Proxy Cryptography , 1998, EUROCRYPT.
[32] Ran Canetti,et al. Chosen-ciphertext secure proxy re-encryption , 2007, CCS '07.
[33] Pascal Felber,et al. Efficient Key Updates through Subscription Re-encryption for Privacy-Preserving Publish/Subscribe , 2015, Middleware.
[34] Werner Vogels,et al. Dynamo: amazon's highly available key-value store , 2007, SOSP.
[35] Chris Peikert,et al. A Decade of Lattice Cryptography , 2016, Found. Trends Theor. Comput. Sci..
[36] Yevgeniy Dodis,et al. Proxy cryptography revisted , 2003 .
[37] Matthew Green,et al. Improved proxy re-encryption schemes with applications to secure distributed storage , 2006, TSEC.
[38] Mudhakar Srivatsa,et al. EventGuard: A System Architecture for Securing Publish-Subscribe Networks , 2011, TOCS.
[39] Frederik Vercauteren,et al. Somewhat Practical Fully Homomorphic Encryption , 2012, IACR Cryptol. ePrint Arch..
[40] Himanshu Khurana,et al. Scalable security and accounting services for content-based publish/subscribe systems , 2005, SAC '05.
[41] Phong Q. Nguyen,et al. BKZ 2.0: Better Lattice Security Estimates , 2011, ASIACRYPT.
[42] P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .
[43] Douglas C. Schmidt,et al. QoS enabled dissemination of managed information objects in a publish-subscribe-query information broker , 2009, Defense + Commercial Sensing.
[44] Oded Regev. Quantum Computation and Lattice Problems , 2004, SIAM J. Comput..
[45] Zoltán Miklós. Towards an access control mechanism for wide-area publish/subscribe systems , 2002, Proceedings 22nd International Conference on Distributed Computing Systems Workshops.