CP-ABE with outsourced decryption and directionally hidden policy
暂无分享,去创建一个
[1] Dan Boneh,et al. Fine-grained control of security capabilities , 2004, TOIT.
[2] Yi Mu,et al. Leakage-Resilient Attribute-Based Encryption with Fast Decryption: Models, Analysis and Constructions , 2013, ISPEC.
[3] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[4] Mingwu Zhang,et al. Bounded Leakage-Resilient Functional Encryption with Hidden Vector Predicate , 2013, Comput. J..
[5] Xingming Sun,et al. Achieving Efficient Cloud Search Services: Multi-Keyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing , 2015, IEICE Trans. Commun..
[6] Dan Boneh,et al. Evaluating 2-DNF Formulas on Ciphertexts , 2005, TCC.
[7] Robert H. Deng,et al. Expressive CP-ABE with partially hidden access structures , 2012, ASIACCS '12.
[8] Jin Wang,et al. Mutual Verifiable Provable Data Auditing in Public Cloud Storage , 2015 .
[9] Robert H. Deng,et al. Attribute-Based Encryption With Efficient Verifiable Outsourced Decryption , 2015, IEEE Transactions on Information Forensics and Security.
[10] Tapas Pandit,et al. Efficient Fully Secure Attribute-Based Encryption Schemes for General Access Structures , 2012, ProvSec.
[11] Muthu Ramachandran,et al. Cloud Computing Adoption Framework – a security framework for business clouds , 2015 .
[12] Brent Waters,et al. Attribute-Based Encryption with Fast Decryption , 2013, Public Key Cryptography.
[13] Allison Bishop,et al. Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption , 2010, EUROCRYPT.
[14] Allison Bishop,et al. Achieving Leakage Resilience through Dual System Encryption , 2011, TCC.
[15] Siu-Ming Yiu,et al. Identity-Based Encryption Resilient to Continual Auxiliary Leakage , 2012, EUROCRYPT.
[16] Dong Kun Noh,et al. Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems , 2011, IEEE Transactions on Parallel and Distributed Systems.
[17] Jonathan Katz,et al. Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products , 2008, Journal of Cryptology.
[18] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization , 2011, Public Key Cryptography.
[19] A. Lewko,et al. Fully Secure HIBE with Short Ciphertexts , 2009 .
[20] Matthew Green,et al. Outsourcing the Decryption of ABE Ciphertexts , 2011, USENIX Security Symposium.
[21] Brent Waters,et al. Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions , 2009, IACR Cryptol. ePrint Arch..
[22] P. MuraliKrishna,et al. SECURE SCHEMES FOR SECRET SHARING AND KEY DISTRIBUTION USING PELL'S EQUATION , 2013 .
[23] Robert H. Deng,et al. Attribute-Based Encryption With Verifiable Outsourced Decryption , 2013, IEEE Transactions on Information Forensics and Security.
[24] Anna Gál,et al. Lower bounds for monotone span programs , 2005, computational complexity.
[25] Moti Yung,et al. Adaptively secure non-interactive threshold cryptosystems , 2013, Theor. Comput. Sci..
[26] Amit Sahai,et al. Bounded Ciphertext Policy Attribute Based Encryption , 2008, ICALP.