Anonymous CP-ABE against Side-channel Attacks in Cloud Computing
暂无分享,去创建一个
[1] Sean W. Smith,et al. Attribute-Based Publishing with Hidden Credentials and Hidden Policies , 2007, NDSS.
[2] Yevgeniy Dodis,et al. Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks , 2010, CRYPTO.
[3] Dongdai Lin,et al. Anonymous Identity-Based Hash Proof System and Its Applications , 2012, ProvSec.
[4] Anish Mathuria,et al. On Anonymous Attribute Based Encryption , 2015, ICISS.
[5] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[6] Vinod Vaikuntanathan,et al. Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases , 2010, EUROCRYPT.
[7] Yongbin Zhou,et al. Public-key encryption with keyword search secure against continual memory attacks , 2016, Secur. Commun. Networks.
[8] Eyal Kushilevitz,et al. Exposure-Resilient Functions and All-or-Nothing Transforms , 2000, EUROCRYPT.
[9] Dawu Gu,et al. Efficient Leakage-Resilient Identity-Based Encryption with CCA Security , 2013, Pairing.
[10] Kazuki Yoneyama,et al. Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures , 2008, ACNS.
[11] Jin Li,et al. Privacy-Aware Attribute-Based Encryption with User Accountability , 2009, ISC.
[12] Allison Bishop,et al. Achieving Leakage Resilience through Dual System Encryption , 2011, TCC.
[13] Yael Tauman Kalai,et al. Public-Key Encryption Schemes with Auxiliary Inputs , 2010, TCC.
[14] Jiankun Hu,et al. A general transformation from KP-ABE to searchable encryption , 2014, Future Gener. Comput. Syst..
[15] Siu-Ming Yiu,et al. Attribute-Based Encryption Resilient to Auxiliary Input , 2015, ProvSec.
[16] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[17] Dan Boneh,et al. Evaluating 2-DNF Formulas on Ciphertexts , 2005, TCC.
[18] Qing Wu,et al. Leakage-Resilient Anonymous Identity-Based Broadcast Encryption in the Standard Model , 2015, ICA3PP.
[19] Jonathan Katz,et al. Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products , 2008, Journal of Cryptology.
[20] Jin Li,et al. Anonymous attribute-based encryption supporting efficient decryption test , 2013, ASIA CCS '13.
[21] Siu-Ming Yiu,et al. Identity-Based Encryption Resilient to Continual Auxiliary Leakage , 2012, EUROCRYPT.