Cryptographic Enforcement of Attribute-based Authentication

[1]  Reihaneh Safavi-Naini,et al.  Threshold Attribute-Based Signcryption , 2010, SCN.

[2]  Christian Schläger,et al.  Supporting Attribute-based Access Control in Authorization and Authentication Infrastructures with Ontologies , 2007, J. Softw..

[3]  Christian Hanser,et al.  On cloud storage and the cloud of clouds approach , 2012, 2012 International Conference for Internet Technology and Secured Transactions.

[4]  Marina Blanton,et al.  Message authentication codes , 2000 .

[5]  Xia Peng-wan Mandatory access control model merging with role mechanism , 2007 .

[6]  Robert S. Winternitz Producing a One-Way Hash Function from DES , 1983, CRYPTO.

[7]  Jan Camenisch,et al.  Practical Group Signatures without Random Oracles , 2005, IACR Cryptol. ePrint Arch..

[8]  Dalia Khader,et al.  Attribute based authentication schemes , 2009 .

[9]  Tingting Liu,et al.  Design and Implementation of Linux File Mandatory Access Control , 2012 .

[10]  Daniel Slamanig Dynamic Accumulator Based Discretionary Access Control for Outsourced Storage with Unlinkable Access - (Short Paper) , 2012, Financial Cryptography.

[11]  Feng Yang,et al.  Cross Message Authentication Code Based on Multi-core Computing Technology , 2012 .

[12]  Ben Y. Zhao,et al.  Efficient Batched Synchronization in Dropbox-Like Cloud Storage Services , 2013, Middleware.

[13]  Günther Pernul,et al.  Attribute-Based Authentication and Authorisation Infrastructures for E-Commerce Providers , 2006, EC-Web.

[14]  Dong Kun Noh,et al.  Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems , 2011, IEEE Transactions on Parallel and Distributed Systems.

[15]  Zhibin Zhou,et al.  Efficient Privacy-Preserving Ciphertext-Policy Attribute Based-Encryption and Broadcast Encryption , 2015, IEEE Transactions on Computers.

[16]  Sahadeo Padhye,et al.  Efficient ID-Based Signature Scheme from Bilinear Map , 2011 .

[17]  B. Majhi,et al.  A strong designated verifiable group signature scheme , 2013, 2013 International Mutli-Conference on Automation, Computing, Communication, Control and Compressed Sensing (iMac4s).

[18]  Dengguo Feng,et al.  An Anonymous Property-Based Attestation Protocol from Bilinear Maps , 2009, 2009 International Conference on Computational Science and Engineering.

[19]  Chun-Xiang Xu,et al.  A CP-ABE scheme with system attributes revocation in cloud storage , 2014, 2014 11th International Computer Conference on Wavelet Actiev Media Technology and Information Processing(ICCWAMTIP).

[20]  Sylvia L. Osborn,et al.  HGABAC: Towards a Formal Model of Hierarchical Attribute-Based Access Control , 2014, FPS.

[21]  Dalia Khader,et al.  Attribute Based Search in Encrypted Data: ABSE , 2014, WISCS '14.

[22]  Yan Ren,et al.  An Attribute-Based Anonymous Authentication Scheme , 2013, 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies.

[23]  W. Wenqiang,et al.  Attribute-based ring signature scheme with constant-size signature , 2010 .

[24]  Zhi-Ren Qiu,et al.  A Rapid and Efficient Pre-deployment Key Scheme for Secure Data Transmissions in Sensor Networks Using Lagrange Interpolation Polynomial , 2008, 2008 International Conference on Information Security and Assurance (isa 2008).

[25]  Brent Waters,et al.  Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.

[26]  Mihir Bellare,et al.  Foundations of Group Signatures: Formal Definitions, Simplified Requirements, and a Construction Based on General Assumptions , 2003, EUROCRYPT.

[27]  Dan Boneh,et al.  Short Signatures Without Random Oracles , 2004, EUROCRYPT.

[28]  Hovav Shacham,et al.  Short Group Signatures , 2004, CRYPTO.

[29]  David Jao,et al.  Boneh-Boyen Signatures and the Strong Diffie-Hellman Problem , 2009, Pairing.

[30]  Jan Camenisch,et al.  Concepts and languages for privacy-preserving attribute-based authentication , 2013, J. Inf. Secur. Appl..

[31]  R. Manjusha,et al.  Comparative study of attribute based encryption techniques in cloud computing , 2014, 2014 International Conference on Embedded Systems (ICES).

[32]  Rajarathnam Nallusamy,et al.  Multi-user Attribute Based Searchable Encryption , 2013, 2013 IEEE 14th International Conference on Mobile Data Management.

[33]  Jon A. Solworth,et al.  The Complexity of Discretionary Access Control , 2006, IWSEC.

[34]  Máté Horváth,et al.  Attribute-Based Encryption Optimized for Cloud Computing , 2015, IACR Cryptol. ePrint Arch..

[35]  Jian Liu,et al.  Strongly Secure Attribute-Based Authenticated Key Exchange with Traceability , 2012, WISM.

[36]  Moti Yung,et al.  Scalable Group Signatures with Revocation , 2012, EUROCRYPT.

[37]  Oded Goldreich Foundations of Cryptography: Volume 1 , 2006 .

[38]  Vladimir A. Oleshchuk,et al.  An Efficient Traceable Attribute-Based Authentication Scheme with One-Time Attribute Trees , 2015, NordSec.

[39]  Jan Camenisch,et al.  Efficient Group Signature Schemes for Large Groups (Extended Abstract) , 1997, CRYPTO.

[40]  Jie Wu,et al.  Hierarchical attribute-based encryption for fine-grained access control in cloud storage services , 2010, CCS '10.

[41]  Michael Privat,et al.  Talking to Services: iCloud and Dropbox , 2014 .

[42]  Xuejiao Liu,et al.  Hierarchical Attribute-Based Access Control with Authentication for Outsourced Data in Cloud Computing , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.

[43]  Jiqiang Liu,et al.  Directly revocable key-policy attribute-based encryption with verifiable ciphertext delegation , 2015, Inf. Sci..

[44]  Allison Bishop,et al.  Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption , 2010, EUROCRYPT.

[45]  Tatsuaki Okamoto,et al.  Cryptography Based on Bilinear Maps , 2006, AAECC.

[46]  Hui-yan Chen,et al.  Practical identity-based aggregate signature from bilinear maps , 2008 .

[47]  M. Farhatullah,et al.  PccP: A model for Preserving cloud computing Privacy , 2012, 2012 International Conference on Data Science & Engineering (ICDSE).

[48]  Ramaswamy Chandramouli,et al.  The Queen's Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms , 2001, ACM Trans. Inf. Syst. Secur..

[49]  Xuanwu Zhou Study on ring signature and its application , 2009, 2009 Chinese Control and Decision Conference.

[50]  Louis Granboulan,et al.  Short Signatures in the Random Oracle Model , 2002, ASIACRYPT.

[51]  Tapas Pandit,et al.  Efficient Fully Secure Attribute-Based Encryption Schemes for General Access Structures , 2012, ProvSec.

[52]  Ming Gu,et al.  Hierarchical Attribute-Set Based Encryption for Scalable, Flexible and Fine-Grained Access Control in Cloud Computing , 2011, ISPEC.

[53]  Kwangjo Kim,et al.  ID-Based Blind Signature and Ring Signature from Pairings , 2002, ASIACRYPT.

[54]  Dong Hoon Lee,et al.  Attribute-based access control using combined authentication technologies , 2008, 2008 IEEE International Conference on Granular Computing.

[55]  Robert H. Deng,et al.  Fully secure key-policy attribute-based encryption with constant-size ciphertexts and fast decryption , 2014, AsiaCCS.

[56]  Sylvia L. Osborn Role-Based Access Control , 2007, Security, Privacy, and Trust in Modern Data Management.

[57]  Mihir Bellare,et al.  Proving Computational Ability , 2011, Studies in Complexity and Cryptography.

[58]  Qiaoyan Wen,et al.  Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing , 2016, IEEE Transactions on Parallel and Distributed Systems.

[59]  P. Praveen Chandar,et al.  Hierarchical attribute based proxy re-encryption access control in cloud computing , 2014, 2014 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2014].

[60]  Manoj Prabhakaran,et al.  Attribute-Based Signatures , 2011, CT-RSA.

[61]  Ji-Seon Lee,et al.  Strong Designated Verifier Ring Signature Scheme , 2007 .

[62]  Khaled Alghathbar,et al.  NMACA Approach Used to Build a Secure Message Authentication Code , 2010, FGIT-SecTech/DRBC.

[63]  David Chaum,et al.  Group Signatures , 1991, EUROCRYPT.

[64]  Kefei Chen,et al.  Accountable authority key policy attribute-based encryption , 2012, Science China Information Sciences.

[65]  Brent Waters,et al.  Practical constructions and new proof methods for large universe attribute-based encryption , 2013, CCS.

[66]  Dongqing Xie,et al.  Multi-authority ciphertext-policy attribute-based encryption with accountability , 2011, ASIACCS '11.

[67]  Devesh C. Jinwala,et al.  A Novel Approach for Searchable CP-ABE with Hidden Ciphertext-Policy , 2014, ICISS.

[68]  Vladimir A. Oleshchuk,et al.  Traceable hierarchical attribute-based authentication for the cloud , 2015, 2015 IEEE Conference on Communications and Network Security (CNS).

[69]  Boniface Kayode Alese,et al.  An Attribute-Based Signature using rivest shamir adleman scheme , 2014, The 9th International Conference for Internet Technology and Secured Transactions (ICITST-2014).

[70]  Jinshu Su,et al.  Authenticating with Attributes in Online Social Networks , 2011, 2011 14th International Conference on Network-Based Information Systems.

[72]  Jin Li,et al.  Defending against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems , 2009, SecureComm.

[73]  Li Wang,et al.  Research on Pricing Model of Cloud Storage , 2013, 2013 IEEE Ninth World Congress on Services.

[74]  Jiankun Hu,et al.  A general transformation from KP-ABE to searchable encryption , 2014, Future Gener. Comput. Syst..

[75]  Rakesh Bobba,et al.  Attribute-Sets: A Practically Motivated Enhancement to Attribute-Based Encryption , 2009, ESORICS.

[76]  Yiming Zhao,et al.  Efficient Traceable Attribute-Based Signature , 2014, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications.

[77]  Vladimir A. Oleshchuk,et al.  A Dynamic Attribute-Based Authentication Scheme , 2015, C2SI.

[78]  Haibo Shen A Semantic-Aware Attribute-Based Access Control Model for Web Services , 2009, ICA3PP.

[79]  Sushmita Ruj,et al.  Privacy Preserving Access Control with Authentication for Securing Data in Clouds , 2012, 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (ccgrid 2012).

[80]  Lein Harn,et al.  Generalized Ring Signatures , 2008, IEEE Transactions on Dependable and Secure Computing.

[81]  R. A. Rueppel,et al.  Message recovery for signature schemes based on the discrete logarithm problem , 1994, EUROCRYPT.

[82]  Xiaohui Liang,et al.  Provably secure and efficient bounded ciphertext policy attribute based encryption , 2009, ASIACCS '09.

[83]  Sushmita Ruj,et al.  Attribute based access control in clouds: A survey , 2014, International Conference on Signal Processing and Communications.

[84]  Lin Gao,et al.  Fine-grained document sharing using attribute-based encryption in cloud servers , 2013, Third International Conference on Innovative Computing Technology (INTECH 2013).

[85]  Masami Mohri,et al.  Attribute-Based Encryption with Attribute Revocation and Grant Function Using Proxy Re-encryption and Attribute Key for Updating , 2014 .

[86]  Germán Sáez,et al.  Forking Lemmas for Ring Signature Schemes , 2003, INDOCRYPT.

[87]  Josef Pieprzyk,et al.  Keyed Hash Functions , 1995, Cryptography: Policy and Algorithms.

[88]  Yuguang Fang,et al.  PAAS: A Privacy-Preserving Attribute-Based Authentication System for eHealth Networks , 2012, 2012 IEEE 32nd International Conference on Distributed Computing Systems.

[89]  Manoj R. Sastry,et al.  Attribute-Based Authentication Model for Dynamic Mobile Environments , 2006, SPC.

[90]  Mihir Bellare,et al.  A Note on Negligible Functions , 2002, Journal of Cryptology.

[91]  Brent Waters,et al.  Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.

[92]  Morteza Amini,et al.  A Dynamic Mandatory Access Control Model , 2008 .

[93]  Alessandro Armando,et al.  Attribute based access control for APIs in spring security , 2014, SACMAT '14.

[94]  Mohammad Mahdi Jahani Yekta,et al.  Equivalence of the Lagrange interpolator for uniformly sampled signals and the scaled binomially windowed shifted sinc function , 2009, Digit. Signal Process..

[95]  Cong Wang,et al.  Enhancing attribute-based encryption with attribute hierarchy , 2009, ICC 2009.

[96]  Ran Canetti,et al.  The random oracle methodology, revisited , 2000, JACM.

[98]  Yael Tauman Kalai,et al.  How to Leak a Secret: Theory and Applications of Ring Signatures , 2006, Essays in Memory of Shimon Even.

[99]  Zhen Liu,et al.  Fully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size Ciphertexts , 2014, Inscrypt.

[100]  S. Hamouda,et al.  Security and privacy in cloud computing , 2012, 2012 International Conference on Cloud Computing Technologies, Applications and Management (ICCCTAM).

[101]  Tsz Hon Yuen,et al.  Threshold ring signature without random oracles , 2011, ASIACCS '11.

[102]  Yan Zhang,et al.  Negotiation Based Framework for Attribute-Based Access Control Policy Evaluation , 2014, SIN.

[103]  Seiko Arita,et al.  Attribute-based signatures without pairings via the fiat-shamir paradigm , 2014, ASIAPKC '14.

[104]  Ninghui Li,et al.  Discretionary Access Control , 2011, Encyclopedia of Cryptography and Security.

[105]  Yuguang Fang,et al.  A Privacy-Preserving Attribute-Based Authentication System for Mobile Health Networks , 2014, IEEE Transactions on Mobile Computing.

[106]  Hovav Shacham,et al.  Group signatures with verifier-local revocation , 2004, CCS '04.

[107]  Dongqing Xie,et al.  Attribute-based signature and its applications , 2010, ASIACCS '10.

[108]  Colin Boyd,et al.  Attribute-Based Authenticated Key Exchange , 2010, ACISP.

[109]  Nicola Zannone,et al.  Enforcing Access Control in Virtual Organizations Using Hierarchical Attribute-Based Encryption , 2012, 2012 Seventh International Conference on Availability, Reliability and Security.

[110]  M V Patil,et al.  HASBE: A HIERARCHICAL ATTRIBUTE-BASED SOLUTION FOR FLEXIBLE AND SCALABLE ACCESS CONTROL IN CLOUD COMPUTING , 2006 .

[111]  Nuttapong Attrapadung,et al.  Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings , 2015, CT-RSA.

[112]  Seiko Arita Flexible Attribute-Based Encryption , 2012, ICICS.

[113]  Lei Wu,et al.  Attribute-Based Access Control Security Model in Service-Oriented Computing , 2014 .

[114]  N. Anithadevi,et al.  Single Sign on Mechanism Using Attribute Based Encryption in Distributed Computer Networks , 2015 .

[115]  Michael Segal,et al.  Dynamic attribute based vehicle authentication , 2014, 2014 IEEE 13th International Symposium on Network Computing and Applications.

[116]  Germán Sáez,et al.  New Identity-Based Ring Signature Schemes , 2004, ICICS.

[117]  Roberto Mínguez,et al.  Functional Networks and the Lagrange Polynomial Interpolation , 2006, IDEAL.

[118]  Chanathip Namprempre,et al.  From Identification to Signatures via the Fiat-Shamir Transform: Minimizing Assumptions for Security and Forward-Security , 2002, EUROCRYPT.

[119]  Moti Yung,et al.  Dynamic fully forward-secure group signatures , 2010, ASIACCS '10.

[120]  Atsuko Miyaji,et al.  A Dynamic Attribute-Based Group Signature Scheme and its Application in an Anonymous Survey for the Collection of Attribute Statistics , 2009, 2009 International Conference on Availability, Reliability and Security.

[121]  Daniel M. Gordon Discrete Logarithm Problem , 2005, Encyclopedia of Cryptography and Security.

[122]  Li Xu,et al.  Attribute-Based Signatures with Efficient Revocation , 2013, 2013 5th International Conference on Intelligent Networking and Collaborative Systems.

[123]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[124]  Changji Wang,et al.  A Secure and Efficient Key-Policy Attribute Based Key Encryption Scheme , 2009, 2009 First International Conference on Information Science and Engineering.

[125]  LI Bing-yu Lagrange interpolation formulas with multiplicity knots , 2007 .

[126]  Jianfeng Ma,et al.  Key-Policy Weighted Attribute based Encryption for fine-grained access control , 2014, 2014 IEEE International Conference on Communications Workshops (ICC).

[127]  B. Balamurugan,et al.  Enhanced Attribute Based Encryption for Cloud Computing , 2015 .

[128]  Masami Mohri,et al.  Provably secure attribute-based encryption with attribute revocation and grant function using proxy re-encryption and attribute key for updating , 2015, Human-centric Computing and Information Sciences.

[129]  Hao Wang,et al.  Server Aided Ciphertext-Policy Attribute-Based Encryption , 2015, 2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops.

[130]  Dongdai Lin,et al.  Unlinkable Randomizable Signature and Its Application in Group Signature , 2007, Inscrypt.

[131]  Tsz Hon Yuen,et al.  Ring signatures without random oracles , 2006, ASIACCS '06.

[132]  Jonathan Katz The Random Oracle Model , 2010 .

[133]  Aijun-J. Ge,et al.  Attribute-based Signature Scheme with Constant Size Signature ⋆ , 2012 .

[134]  Wei Sun,et al.  A Fuzzy Attribute-Based Authentication Scheme on the Basis of Lagrange Polynomial Interpolation , 2014, HCC.

[135]  Cong Wang,et al.  Attribute based data sharing with attribute revocation , 2010, ASIACCS '10.

[136]  Javier Herranz,et al.  Attribute-based encryption schemes with constant-size ciphertexts , 2012, Theor. Comput. Sci..

[137]  Han-Chieh Chao,et al.  Privacy-Preserving Multikeyword Similarity Search Over Outsourced Cloud Data , 2017, IEEE Systems Journal.