A lightweight verifiable outsourced decryption of attribute-based encryption scheme for blockchain-enabled wireless body area network in fog computing
暂无分享,去创建一个
Rui Guo | Huixian Shi | Dong Zheng | Yinghui Zhang | Chaoyuan Zhuang | Huixian Shi | Yinghui Zhang | Dong Zheng | Rui-Fang Guo | Chaoyuan Zhuang
[1] Rui Guo,et al. Secure Attribute-Based Signature Scheme With Multiple Authorities for Blockchain in Electronic Health Records Systems , 2018, IEEE Access.
[2] Rui Guo,et al. A Distributed Access Control with Outsourced Computation in Fog Computing , 2019, Secur. Commun. Networks.
[3] Giuseppe Anastasi,et al. Fog Computing for the Internet of Mobile Things: Issues and Challenges , 2017, 2017 IEEE International Conference on Smart Computing (SMARTCOMP).
[4] Débora C. Muchaluat-Saade,et al. Towards a Blockchain-Based Secure Electronic Medical Record for Healthcare Applications , 2019, ICC 2019 - 2019 IEEE International Conference on Communications (ICC).
[5] Raja Lavanya,et al. Fog Computing and Its Role in the Internet of Things , 2019, Advances in Computer and Electrical Engineering.
[6] Satoshi Nakamoto. Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .
[7] Allison Bishop,et al. Unbounded HIBE and Attribute-Based Encryption , 2011, IACR Cryptol. ePrint Arch..
[8] Allison Bishop,et al. Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption , 2010, EUROCRYPT.
[9] Robert H. Deng,et al. Outsourcing Service Fair Payment Based on Blockchain and Its Applications in Cloud Computing , 2018, IEEE Transactions on Services Computing.
[10] Mohsen Guizani,et al. BPDS: A Blockchain Based Privacy-Preserving Data Sharing for Electronic Medical Records , 2018, 2018 IEEE Global Communications Conference (GLOBECOM).
[11] Rafail Ostrovsky,et al. Attribute-based encryption with non-monotonic access structures , 2007, CCS '07.
[12] Robert H. Deng,et al. Attribute-Based Encryption With Verifiable Outsourced Decryption , 2013, IEEE Transactions on Information Forensics and Security.
[13] Mohamed Amine Ferrag,et al. Blockchain Technologies for the Internet of Things: Research Issues and Challenges , 2018, IEEE Internet of Things Journal.
[14] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization , 2011, Public Key Cryptography.
[15] Mohsen Guizani,et al. Blockchain-Based Mobile Edge Computing Framework for Secure Therapy Applications , 2018, IEEE Access.
[16] Qiaoyan Wen,et al. An Efficient ABE Scheme With Verifiable Outsourced Encryption and Decryption , 2019, IEEE Access.
[17] Jiangtao Wen,et al. The IoT electric business model: Using blockchain technology for the internet of things , 2016, Peer-to-Peer Networking and Applications.
[18] Fan Wu,et al. A Robust and Energy Efficient Authentication Protocol for Industrial Internet of Things , 2018, IEEE Internet of Things Journal.
[19] Mateo Valero,et al. Tackling IoT Ultra Large Scale Systems: Fog Computing in Support of Hierarchical Emergent Behaviors , 2018 .
[20] Kai Fan,et al. Efficient and privacy preserving access control scheme for fog-enabled IoT , 2019, Future Gener. Comput. Syst..
[21] Tatsuaki Okamoto,et al. Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption , 2010, IACR Cryptol. ePrint Arch..
[22] Robert H. Deng,et al. Blockchain based efficient and robust fair payment for outsourcing services in cloud computing , 2018, Inf. Sci..
[23] Matthew Green,et al. Outsourcing the Decryption of ABE Ciphertexts , 2011, USENIX Security Symposium.
[24] Min Ji,et al. CCA-secure ABE with outsourced decryption for fog computing , 2018, Future Gener. Comput. Syst..
[25] Yanli Ren,et al. Towards Efficient, Secure, and Fine-Grained Access Control System in MSNs with Flexible Revocations , 2015, Int. J. Distributed Sens. Networks.
[26] Rui Zhang,et al. A Blockchain based Access Control System for Cloud Storage , 2019 .
[27] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .
[28] Tie Qiu,et al. Survey on fog computing: architecture, key technologies, applications and open issues , 2017, J. Netw. Comput. Appl..
[29] Yao Wang,et al. Full Verifiability for Outsourced Decryption in Attribute Based Encryption , 2020, IEEE Transactions on Services Computing.
[30] Tao Xiang,et al. Secure and Efficient Data Communication Protocol for Wireless Body Area Networks , 2016, IEEE Transactions on Multi-Scale Computing Systems.
[31] Rui Guo,et al. Flexible and Efficient Blockchain-Based ABE Scheme With Multi-Authority for Medical on Demand in Telemedicine System , 2019, IEEE Access.
[32] Jianfeng Ma,et al. Lightweight Fine-Grained Search Over Encrypted Data in Fog Computing , 2019, IEEE Transactions on Services Computing.
[33] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[34] Ingrid Moerman,et al. A survey on wireless body area networks , 2011, Wirel. Networks.
[35] Jian Shen,et al. Verifiable Outsourced Decryption of Attribute-Based Encryption with Constant Ciphertext Length , 2017, Secur. Commun. Networks.
[36] Qixiang Mei,et al. Generic and Efficient Constructions of Attribute-Based Encryption with Verifiable Outsourced Decryption , 2016, IEEE Transactions on Dependable and Secure Computing.
[37] Robert H. Deng,et al. Attribute-Based Encryption With Efficient Verifiable Outsourced Decryption , 2015, IEEE Transactions on Information Forensics and Security.
[38] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[39] Xiong Li,et al. Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks , 2017, Comput. Networks.
[40] Keke Gai,et al. Controllable and trustworthy blockchain-based cloud data management , 2019, Future Gener. Comput. Syst..
[41] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.