Cryptographic Enforcement of Attribute-based Authentication
暂无分享,去创建一个
[1] Reihaneh Safavi-Naini,et al. Threshold Attribute-Based Signcryption , 2010, SCN.
[2] Christian Schläger,et al. Supporting Attribute-based Access Control in Authorization and Authentication Infrastructures with Ontologies , 2007, J. Softw..
[3] Christian Hanser,et al. On cloud storage and the cloud of clouds approach , 2012, 2012 International Conference for Internet Technology and Secured Transactions.
[4] Marina Blanton,et al. Message authentication codes , 2000 .
[5] Xia Peng-wan. Mandatory access control model merging with role mechanism , 2007 .
[6] Robert S. Winternitz. Producing a One-Way Hash Function from DES , 1983, CRYPTO.
[7] Jan Camenisch,et al. Practical Group Signatures without Random Oracles , 2005, IACR Cryptol. ePrint Arch..
[8] Dalia Khader,et al. Attribute based authentication schemes , 2009 .
[9] Tingting Liu,et al. Design and Implementation of Linux File Mandatory Access Control , 2012 .
[10] Daniel Slamanig. Dynamic Accumulator Based Discretionary Access Control for Outsourced Storage with Unlinkable Access - (Short Paper) , 2012, Financial Cryptography.
[11] Feng Yang,et al. Cross Message Authentication Code Based on Multi-core Computing Technology , 2012 .
[12] Ben Y. Zhao,et al. Efficient Batched Synchronization in Dropbox-Like Cloud Storage Services , 2013, Middleware.
[13] Günther Pernul,et al. Attribute-Based Authentication and Authorisation Infrastructures for E-Commerce Providers , 2006, EC-Web.
[14] Dong Kun Noh,et al. Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems , 2011, IEEE Transactions on Parallel and Distributed Systems.
[15] Zhibin Zhou,et al. Efficient Privacy-Preserving Ciphertext-Policy Attribute Based-Encryption and Broadcast Encryption , 2015, IEEE Transactions on Computers.
[16] Sahadeo Padhye,et al. Efficient ID-Based Signature Scheme from Bilinear Map , 2011 .
[17] B. Majhi,et al. A strong designated verifiable group signature scheme , 2013, 2013 International Mutli-Conference on Automation, Computing, Communication, Control and Compressed Sensing (iMac4s).
[18] Dengguo Feng,et al. An Anonymous Property-Based Attestation Protocol from Bilinear Maps , 2009, 2009 International Conference on Computational Science and Engineering.
[19] Chun-Xiang Xu,et al. A CP-ABE scheme with system attributes revocation in cloud storage , 2014, 2014 11th International Computer Conference on Wavelet Actiev Media Technology and Information Processing(ICCWAMTIP).
[20] Sylvia L. Osborn,et al. HGABAC: Towards a Formal Model of Hierarchical Attribute-Based Access Control , 2014, FPS.
[21] Dalia Khader,et al. Attribute Based Search in Encrypted Data: ABSE , 2014, WISCS '14.
[22] Yan Ren,et al. An Attribute-Based Anonymous Authentication Scheme , 2013, 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies.
[23] W. Wenqiang,et al. Attribute-based ring signature scheme with constant-size signature , 2010 .
[24] Zhi-Ren Qiu,et al. A Rapid and Efficient Pre-deployment Key Scheme for Secure Data Transmissions in Sensor Networks Using Lagrange Interpolation Polynomial , 2008, 2008 International Conference on Information Security and Assurance (isa 2008).
[25] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[26] Mihir Bellare,et al. Foundations of Group Signatures: Formal Definitions, Simplified Requirements, and a Construction Based on General Assumptions , 2003, EUROCRYPT.
[27] Dan Boneh,et al. Short Signatures Without Random Oracles , 2004, EUROCRYPT.
[28] Hovav Shacham,et al. Short Group Signatures , 2004, CRYPTO.
[29] David Jao,et al. Boneh-Boyen Signatures and the Strong Diffie-Hellman Problem , 2009, Pairing.
[30] Jan Camenisch,et al. Concepts and languages for privacy-preserving attribute-based authentication , 2013, J. Inf. Secur. Appl..
[31] R. Manjusha,et al. Comparative study of attribute based encryption techniques in cloud computing , 2014, 2014 International Conference on Embedded Systems (ICES).
[32] Rajarathnam Nallusamy,et al. Multi-user Attribute Based Searchable Encryption , 2013, 2013 IEEE 14th International Conference on Mobile Data Management.
[33] Jon A. Solworth,et al. The Complexity of Discretionary Access Control , 2006, IWSEC.
[34] Máté Horváth,et al. Attribute-Based Encryption Optimized for Cloud Computing , 2015, IACR Cryptol. ePrint Arch..
[35] Jian Liu,et al. Strongly Secure Attribute-Based Authenticated Key Exchange with Traceability , 2012, WISM.
[36] Moti Yung,et al. Scalable Group Signatures with Revocation , 2012, EUROCRYPT.
[37] Oded Goldreich. Foundations of Cryptography: Volume 1 , 2006 .
[38] Vladimir A. Oleshchuk,et al. An Efficient Traceable Attribute-Based Authentication Scheme with One-Time Attribute Trees , 2015, NordSec.
[39] Jan Camenisch,et al. Efficient Group Signature Schemes for Large Groups (Extended Abstract) , 1997, CRYPTO.
[40] Jie Wu,et al. Hierarchical attribute-based encryption for fine-grained access control in cloud storage services , 2010, CCS '10.
[41] Michael Privat,et al. Talking to Services: iCloud and Dropbox , 2014 .
[42] Xuejiao Liu,et al. Hierarchical Attribute-Based Access Control with Authentication for Outsourced Data in Cloud Computing , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.
[43] Jiqiang Liu,et al. Directly revocable key-policy attribute-based encryption with verifiable ciphertext delegation , 2015, Inf. Sci..
[44] Allison Bishop,et al. Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption , 2010, EUROCRYPT.
[45] Tatsuaki Okamoto,et al. Cryptography Based on Bilinear Maps , 2006, AAECC.
[46] Hui-yan Chen,et al. Practical identity-based aggregate signature from bilinear maps , 2008 .
[47] M. Farhatullah,et al. PccP: A model for Preserving cloud computing Privacy , 2012, 2012 International Conference on Data Science & Engineering (ICDSE).
[48] Ramaswamy Chandramouli,et al. The Queen's Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms , 2001, ACM Trans. Inf. Syst. Secur..
[49] Xuanwu Zhou. Study on ring signature and its application , 2009, 2009 Chinese Control and Decision Conference.
[50] Louis Granboulan,et al. Short Signatures in the Random Oracle Model , 2002, ASIACRYPT.
[51] Tapas Pandit,et al. Efficient Fully Secure Attribute-Based Encryption Schemes for General Access Structures , 2012, ProvSec.
[52] Ming Gu,et al. Hierarchical Attribute-Set Based Encryption for Scalable, Flexible and Fine-Grained Access Control in Cloud Computing , 2011, ISPEC.
[53] Kwangjo Kim,et al. ID-Based Blind Signature and Ring Signature from Pairings , 2002, ASIACRYPT.
[54] Dong Hoon Lee,et al. Attribute-based access control using combined authentication technologies , 2008, 2008 IEEE International Conference on Granular Computing.
[55] Robert H. Deng,et al. Fully secure key-policy attribute-based encryption with constant-size ciphertexts and fast decryption , 2014, AsiaCCS.
[56] Sylvia L. Osborn. Role-Based Access Control , 2007, Security, Privacy, and Trust in Modern Data Management.
[57] Mihir Bellare,et al. Proving Computational Ability , 2011, Studies in Complexity and Cryptography.
[58] Qiaoyan Wen,et al. Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing , 2016, IEEE Transactions on Parallel and Distributed Systems.
[59] P. Praveen Chandar,et al. Hierarchical attribute based proxy re-encryption access control in cloud computing , 2014, 2014 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2014].
[60] Manoj Prabhakaran,et al. Attribute-Based Signatures , 2011, CT-RSA.
[61] Ji-Seon Lee,et al. Strong Designated Verifier Ring Signature Scheme , 2007 .
[62] Khaled Alghathbar,et al. NMACA Approach Used to Build a Secure Message Authentication Code , 2010, FGIT-SecTech/DRBC.
[63] David Chaum,et al. Group Signatures , 1991, EUROCRYPT.
[64] Kefei Chen,et al. Accountable authority key policy attribute-based encryption , 2012, Science China Information Sciences.
[65] Brent Waters,et al. Practical constructions and new proof methods for large universe attribute-based encryption , 2013, CCS.
[66] Dongqing Xie,et al. Multi-authority ciphertext-policy attribute-based encryption with accountability , 2011, ASIACCS '11.
[67] Devesh C. Jinwala,et al. A Novel Approach for Searchable CP-ABE with Hidden Ciphertext-Policy , 2014, ICISS.
[68] Vladimir A. Oleshchuk,et al. Traceable hierarchical attribute-based authentication for the cloud , 2015, 2015 IEEE Conference on Communications and Network Security (CNS).
[69] Boniface Kayode Alese,et al. An Attribute-Based Signature using rivest shamir adleman scheme , 2014, The 9th International Conference for Internet Technology and Secured Transactions (ICITST-2014).
[70] Jinshu Su,et al. Authenticating with Attributes in Online Social Networks , 2011, 2011 14th International Conference on Network-Based Information Systems.
[72] Jin Li,et al. Defending against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems , 2009, SecureComm.
[73] Li Wang,et al. Research on Pricing Model of Cloud Storage , 2013, 2013 IEEE Ninth World Congress on Services.
[74] Jiankun Hu,et al. A general transformation from KP-ABE to searchable encryption , 2014, Future Gener. Comput. Syst..
[75] Rakesh Bobba,et al. Attribute-Sets: A Practically Motivated Enhancement to Attribute-Based Encryption , 2009, ESORICS.
[76] Yiming Zhao,et al. Efficient Traceable Attribute-Based Signature , 2014, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications.
[77] Vladimir A. Oleshchuk,et al. A Dynamic Attribute-Based Authentication Scheme , 2015, C2SI.
[78] Haibo Shen. A Semantic-Aware Attribute-Based Access Control Model for Web Services , 2009, ICA3PP.
[79] Sushmita Ruj,et al. Privacy Preserving Access Control with Authentication for Securing Data in Clouds , 2012, 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (ccgrid 2012).
[80] Lein Harn,et al. Generalized Ring Signatures , 2008, IEEE Transactions on Dependable and Secure Computing.
[81] R. A. Rueppel,et al. Message recovery for signature schemes based on the discrete logarithm problem , 1994, EUROCRYPT.
[82] Xiaohui Liang,et al. Provably secure and efficient bounded ciphertext policy attribute based encryption , 2009, ASIACCS '09.
[83] Sushmita Ruj,et al. Attribute based access control in clouds: A survey , 2014, International Conference on Signal Processing and Communications.
[84] Lin Gao,et al. Fine-grained document sharing using attribute-based encryption in cloud servers , 2013, Third International Conference on Innovative Computing Technology (INTECH 2013).
[85] Masami Mohri,et al. Attribute-Based Encryption with Attribute Revocation and Grant Function Using Proxy Re-encryption and Attribute Key for Updating , 2014 .
[86] Germán Sáez,et al. Forking Lemmas for Ring Signature Schemes , 2003, INDOCRYPT.
[87] Josef Pieprzyk,et al. Keyed Hash Functions , 1995, Cryptography: Policy and Algorithms.
[88] Yuguang Fang,et al. PAAS: A Privacy-Preserving Attribute-Based Authentication System for eHealth Networks , 2012, 2012 IEEE 32nd International Conference on Distributed Computing Systems.
[89] Manoj R. Sastry,et al. Attribute-Based Authentication Model for Dynamic Mobile Environments , 2006, SPC.
[90] Mihir Bellare,et al. A Note on Negligible Functions , 2002, Journal of Cryptology.
[91] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[92] Morteza Amini,et al. A Dynamic Mandatory Access Control Model , 2008 .
[93] Alessandro Armando,et al. Attribute based access control for APIs in spring security , 2014, SACMAT '14.
[94] Mohammad Mahdi Jahani Yekta,et al. Equivalence of the Lagrange interpolator for uniformly sampled signals and the scaled binomially windowed shifted sinc function , 2009, Digit. Signal Process..
[95] Cong Wang,et al. Enhancing attribute-based encryption with attribute hierarchy , 2009, ICC 2009.
[96] Ran Canetti,et al. The random oracle methodology, revisited , 2000, JACM.
[98] Yael Tauman Kalai,et al. How to Leak a Secret: Theory and Applications of Ring Signatures , 2006, Essays in Memory of Shimon Even.
[99] Zhen Liu,et al. Fully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size Ciphertexts , 2014, Inscrypt.
[100] S. Hamouda,et al. Security and privacy in cloud computing , 2012, 2012 International Conference on Cloud Computing Technologies, Applications and Management (ICCCTAM).
[101] Tsz Hon Yuen,et al. Threshold ring signature without random oracles , 2011, ASIACCS '11.
[102] Yan Zhang,et al. Negotiation Based Framework for Attribute-Based Access Control Policy Evaluation , 2014, SIN.
[103] Seiko Arita,et al. Attribute-based signatures without pairings via the fiat-shamir paradigm , 2014, ASIAPKC '14.
[104] Ninghui Li,et al. Discretionary Access Control , 2011, Encyclopedia of Cryptography and Security.
[105] Yuguang Fang,et al. A Privacy-Preserving Attribute-Based Authentication System for Mobile Health Networks , 2014, IEEE Transactions on Mobile Computing.
[106] Hovav Shacham,et al. Group signatures with verifier-local revocation , 2004, CCS '04.
[107] Dongqing Xie,et al. Attribute-based signature and its applications , 2010, ASIACCS '10.
[108] Colin Boyd,et al. Attribute-Based Authenticated Key Exchange , 2010, ACISP.
[109] Nicola Zannone,et al. Enforcing Access Control in Virtual Organizations Using Hierarchical Attribute-Based Encryption , 2012, 2012 Seventh International Conference on Availability, Reliability and Security.
[110] M V Patil,et al. HASBE: A HIERARCHICAL ATTRIBUTE-BASED SOLUTION FOR FLEXIBLE AND SCALABLE ACCESS CONTROL IN CLOUD COMPUTING , 2006 .
[111] Nuttapong Attrapadung,et al. Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings , 2015, CT-RSA.
[112] Seiko Arita. Flexible Attribute-Based Encryption , 2012, ICICS.
[113] Lei Wu,et al. Attribute-Based Access Control Security Model in Service-Oriented Computing , 2014 .
[114] N. Anithadevi,et al. Single Sign on Mechanism Using Attribute Based Encryption in Distributed Computer Networks , 2015 .
[115] Michael Segal,et al. Dynamic attribute based vehicle authentication , 2014, 2014 IEEE 13th International Symposium on Network Computing and Applications.
[116] Germán Sáez,et al. New Identity-Based Ring Signature Schemes , 2004, ICICS.
[117] Roberto Mínguez,et al. Functional Networks and the Lagrange Polynomial Interpolation , 2006, IDEAL.
[118] Chanathip Namprempre,et al. From Identification to Signatures via the Fiat-Shamir Transform: Minimizing Assumptions for Security and Forward-Security , 2002, EUROCRYPT.
[119] Moti Yung,et al. Dynamic fully forward-secure group signatures , 2010, ASIACCS '10.
[120] Atsuko Miyaji,et al. A Dynamic Attribute-Based Group Signature Scheme and its Application in an Anonymous Survey for the Collection of Attribute Statistics , 2009, 2009 International Conference on Availability, Reliability and Security.
[121] Daniel M. Gordon. Discrete Logarithm Problem , 2005, Encyclopedia of Cryptography and Security.
[122] Li Xu,et al. Attribute-Based Signatures with Efficient Revocation , 2013, 2013 5th International Conference on Intelligent Networking and Collaborative Systems.
[123] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[124] Changji Wang,et al. A Secure and Efficient Key-Policy Attribute Based Key Encryption Scheme , 2009, 2009 First International Conference on Information Science and Engineering.
[125] LI Bing-yu. Lagrange interpolation formulas with multiplicity knots , 2007 .
[126] Jianfeng Ma,et al. Key-Policy Weighted Attribute based Encryption for fine-grained access control , 2014, 2014 IEEE International Conference on Communications Workshops (ICC).
[127] B. Balamurugan,et al. Enhanced Attribute Based Encryption for Cloud Computing , 2015 .
[128] Masami Mohri,et al. Provably secure attribute-based encryption with attribute revocation and grant function using proxy re-encryption and attribute key for updating , 2015, Human-centric Computing and Information Sciences.
[129] Hao Wang,et al. Server Aided Ciphertext-Policy Attribute-Based Encryption , 2015, 2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops.
[130] Dongdai Lin,et al. Unlinkable Randomizable Signature and Its Application in Group Signature , 2007, Inscrypt.
[131] Tsz Hon Yuen,et al. Ring signatures without random oracles , 2006, ASIACCS '06.
[132] Jonathan Katz. The Random Oracle Model , 2010 .
[133] Aijun-J. Ge,et al. Attribute-based Signature Scheme with Constant Size Signature ⋆ , 2012 .
[134] Wei Sun,et al. A Fuzzy Attribute-Based Authentication Scheme on the Basis of Lagrange Polynomial Interpolation , 2014, HCC.
[135] Cong Wang,et al. Attribute based data sharing with attribute revocation , 2010, ASIACCS '10.
[136] Javier Herranz,et al. Attribute-based encryption schemes with constant-size ciphertexts , 2012, Theor. Comput. Sci..
[137] Han-Chieh Chao,et al. Privacy-Preserving Multikeyword Similarity Search Over Outsourced Cloud Data , 2017, IEEE Systems Journal.