An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing
暂无分享,去创建一个
Weixin Xie | Joseph K. Liu | Junwei Zhou | Jianping Yu | Shulan Wang | Jianyong Chen | Joseph K. Liu | Junwei Zhou | Jianyong Chen | W. Xie | Jianping Yu | Shulan Wang
[1] M V Patil,et al. HASBE: A HIERARCHICAL ATTRIBUTE-BASED SOLUTION FOR FLEXIBLE AND SCALABLE ACCESS CONTROL IN CLOUD COMPUTING , 2006 .
[2] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[3] Pieter H. Hartel,et al. Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application , 2009, WISA.
[4] Joseph K. Liu,et al. A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing , 2015, Future Gener. Comput. Syst..
[5] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization , 2011, Public Key Cryptography.
[6] Fuchun Guo,et al. CP-ABE With Constant-Size Keys for Lightweight Devices , 2014, IEEE Transactions on Information Forensics and Security.
[7] Atsuko Miyaji,et al. A ciphertext-policy attribute-based encryption scheme with constant ciphertext length , 2010, Int. J. Appl. Cryptogr..
[8] Quan Yuan,et al. A framework for protecting personal information and privacy , 2015, Secur. Commun. Networks.
[9] Joseph K. Liu,et al. A DFA-Based Functional Proxy Re-Encryption Scheme for Secure Public Cloud Data Sharing , 2014, IEEE Transactions on Information Forensics and Security.
[10] Tao Jiang,et al. TIMER: Secure and Reliable Cloud Storage against Data Re-outsourcing , 2014, ISPEC.
[11] Zoe L. Jiang,et al. Fully Secure Ciphertext-Policy Attribute Based Encryption with Security Mediator , 2014, ICICS.
[12] Brent Waters,et al. Online/Offline Attribute-Based Encryption , 2014, IACR Cryptol. ePrint Arch..
[13] Craig Gentry,et al. Hierarchical ID-Based Cryptography , 2002, ASIACRYPT.
[14] Chun-I Fan,et al. Arbitrary-State Attribute-Based Encryption with Dynamic Membership , 2014, IEEE Transactions on Computers.
[15] Ping Wang,et al. A Novel File Hierarchy Access Control Scheme Using Attribute-Based Encryption , 2014 .
[16] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[17] Ling Cheung,et al. Provably secure ciphertext policy ABE , 2007, CCS '07.
[18] Zhang Peng,et al. Efficient Attribute-Based Encryption from R-LWE , 2014 .
[19] Angelo De Caro,et al. jPBC: Java pairing based cryptography , 2011, 2011 IEEE Symposium on Computers and Communications (ISCC).
[20] Matthew Green,et al. Outsourcing the Decryption of ABE Ciphertexts , 2011, USENIX Security Symposium.
[21] Joseph K. Liu,et al. Extended Proxy-Assisted Approach: Achieving Revocable Fine-Grained Encryption of Cloud Data , 2015, ESORICS.
[22] Siu-Ming Yiu,et al. Identity-Based Encryption with Post-Challenge Auxiliary Inputs for Secure Cloud Applications and Sensor Networks , 2014, ESORICS.
[23] Allison Bishop,et al. Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption , 2010, EUROCRYPT.
[24] Joseph K. Liu,et al. An Efficient Cloud-Based Revocable Identity-Based Proxy Re-encryption Scheme for Public Clouds Data Sharing , 2014, ESORICS.
[25] Guangjun Liu,et al. Ciphertext-Policy Hierarchical Attribute-based Encryption for Fine-Grained Access Control of Encryption Data , 2014, Int. J. Netw. Secur..
[26] Tsz Hon Yuen,et al. k-Times Attribute-Based Anonymous Access Control for Cloud Computing , 2015, IEEE Trans. Computers.
[27] Amit Sahai,et al. Bounded Ciphertext Policy Attribute Based Encryption , 2008, ICALP.
[28] Junbeom Hur,et al. Improving Security and Efficiency in Attribute-Based Data Sharing , 2013, IEEE Transactions on Knowledge and Data Engineering.
[29] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[30] Joseph K. Liu,et al. Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services , 2016, IEEE Transactions on Information Forensics and Security.
[31] Jin Li,et al. An Efficient Ciphertext-Policy Attribute-Based Access Control towards Revocation in Cloud Computing , 2013, J. Univers. Comput. Sci..
[32] Xiaohui Liang,et al. Provably secure and efficient bounded ciphertext policy attribute based encryption , 2009, ASIACCS '09.
[33] Tao Jiang,et al. Towards secure and reliable cloud storage against data re-outsourcing , 2015, Future Gener. Comput. Syst..
[34] Pieter H. Hartel,et al. Efficient and Provable Secure Ciphertext-Policy Attribute-Based Encryption Schemes , 2008, ISPEC.
[35] Fatos Xhafa,et al. An efficient PHR service system supporting fuzzy keyword search and fine-grained access control , 2013, Soft Computing.
[36] Joseph K. Liu,et al. Secure sharing of Personal Health Records in cloud computing: Ciphertext-Policy Attribute-Based Signcryption , 2015, Future Gener. Comput. Syst..
[37] Joseph K. Liu,et al. Security Concerns in Popular Cloud Storage Services , 2013, IEEE Pervasive Computing.
[38] J. Venkata Subramanian,et al. Improving Security and Efficiency in Attribute-Based Data Sharing , 2012 .
[39] K. Kuppusamy,et al. An expressive and provably secure Ciphertext-Policy Attribute-Based Encryption , 2014, Inf. Sci..
[40] Kazuki Yoneyama,et al. Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures , 2008, ACNS.
[41] G. Ravi,et al. Attribute Based Encryption With Verifiable Outsourced Decryption , 2014 .
[42] Xiubin Zou,et al. A hierarchical attribute-based encryption scheme , 2013, Wuhan University Journal of Natural Sciences.
[43] Josep Domingo-Ferrer,et al. Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts , 2014, Inf. Sci..
[44] Jie Wu,et al. Hierarchical attribute-based encryption for fine-grained access control in cloud storage services , 2010, CCS '10.