A new verifiable outsourced ciphertext-policy attribute based encryption for big data privacy and access control in cloud
暂无分享,去创建一个
Syam Kumar Pasupuleti | Praveen Kumar Premkamal | P. J. A. Alphonse | Praveen Kumar Premkamal | S. Pasupuleti | Syam Kumar | P. Alphonse | P. Alphonse
[1] Jin Li,et al. Outsourcing computation of modular exponentiations in cloud computing , 2013, Cluster Computing.
[2] Jinguang Han,et al. VOD-ADAC: Anonymous Distributed Fine-Grained Access Control Protocol with Verifiable Outsourced Decryption in Public Cloud , 2020, IEEE Transactions on Services Computing.
[3] Jin Li,et al. Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing , 2017, Inf. Sci..
[4] Yao Wang,et al. Full Verifiability for Outsourced Decryption in Attribute Based Encryption , 2020, IEEE Transactions on Services Computing.
[5] Josep Domingo-Ferrer,et al. Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts , 2014, Inf. Sci..
[6] Ian Miers,et al. Charm: a framework for rapidly prototyping cryptosystems , 2013, Journal of Cryptographic Engineering.
[7] Jin Li,et al. Multi-authority fine-grained access control with accountability and its application in cloud , 2018, J. Netw. Comput. Appl..
[8] Rui Zhang,et al. A Blockchain based Access Control System for Cloud Storage , 2019 .
[9] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[10] Chunming Tang,et al. Efficient outsourcing schemes of modular exponentiations with checkability for untrusted cloud server , 2015, J. Ambient Intell. Humaniz. Comput..
[11] Jin Li,et al. Secure attribute-based data sharing for resource-limited users in cloud computing , 2018, Comput. Secur..
[12] Jin Li,et al. Online/offline unbounded multi-authority attribute-based encryption for data sharing in mobile cloud computing , 2016, Secur. Commun. Networks.
[13] Rajkumar Buyya,et al. Introduction to Cloud Computing , 2011, CloudCom 2011.
[14] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization , 2011, Public Key Cryptography.
[15] Tianlong Gu,et al. A Ciphertext-Policy Attribute-Based Encryption Based on an Ordered Binary Decision Diagram , 2017, IEEE Access.
[16] Muhammad Shiraz,et al. Big Data: Survey, Technologies, Opportunities, and Challenges , 2014, TheScientificWorldJournal.
[17] Ling Cheung,et al. Provably secure ciphertext policy ABE , 2007, CCS '07.
[18] Hao Wang,et al. Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing , 2016, Soft Computing.
[19] Qixiang Mei,et al. Generic and Efficient Constructions of Attribute-Based Encryption with Verifiable Outsourced Decryption , 2016, IEEE Transactions on Dependable and Secure Computing.
[20] Rui Zhang,et al. Fine-grained access control system based on fully outsourced attribute-based encryption , 2017, J. Syst. Softw..
[21] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[22] Jing Li,et al. Fuzzy encryption in cloud computation: efficient verifiable outsourced attribute-based encryption , 2017, Soft Computing.
[23] Adi Shamir,et al. How to share a secret , 1979, CACM.
[24] Robert H. Deng,et al. Attribute-Based Encryption With Efficient Verifiable Outsourced Decryption , 2015, IEEE Transactions on Information Forensics and Security.
[25] Fuchun Guo,et al. Flexible ciphertext-policy attribute-based encryption supporting AND-gate and threshold with short ciphertexts , 2017, International Journal of Information Security.
[26] Xiaolei Dong,et al. Auditable $\sigma $ -Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing , 2018, IEEE Transactions on Information Forensics and Security.
[27] A AlphonsePJ,et al. Attribute Based Encryption in Cloud Computing , 2018, International Journal of Innovative Technology and Exploring Engineering.
[28] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[29] Sourya Joyee De,et al. Decentralized Access Control on Data in the Cloud with Fast Encryption and Outsourced Decryption , 2014, GLOBECOM 2014.
[30] Jin Li,et al. Secure and efficient outsourcing differential privacy data release scheme in Cyber-physical system , 2020, Future Gener. Comput. Syst..
[31] Hu Xiong,et al. Comments on “Verifiable and Exculpable Outsourced Attribute-Based Encryption for Access Control in Cloud Computing” , 2017, IEEE Transactions on Dependable and Secure Computing.
[32] Gail-Joon Ahn,et al. Security and Privacy Challenges in Cloud Computing Environments , 2010, IEEE Security & Privacy.
[33] Matthew Green,et al. Outsourcing the Decryption of ABE Ciphertexts , 2011, USENIX Security Symposium.
[34] Dharma P. Agrawal,et al. Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security , 2016 .
[35] Hui Ma,et al. Verifiable and Exculpable Outsourced Attribute-Based Encryption for Access Control in Cloud Computing , 2017, IEEE Transactions on Dependable and Secure Computing.