Server‐aided revocable attribute‐based encryption for cloud computing services
暂无分享,去创建一个
[1] Keita Emura,et al. Revocable Identity-Based Encryption Revisited: Security Model and Construction , 2013, Public Key Cryptography.
[2] Junji Shikata,et al. Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application , 2005, ASIACRYPT.
[3] P. MuraliKrishna,et al. SECURE SCHEMES FOR SECRET SHARING AND KEY DISTRIBUTION USING PELL'S EQUATION , 2013 .
[4] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[5] Hui Cui,et al. Server-Aided Revocable Attribute-Based Encryption Resilient to Decryption Key Exposure , 2017, CANS.
[6] Gene Tsudik,et al. Simple Identity-Based Cryptography with Mediated RSA , 2003, CT-RSA.
[7] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[8] Hideki Imai,et al. Attribute-Based Encryption Supporting Direct/Indirect Revocation Modes , 2009, IMACC.
[9] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization , 2011, Public Key Cryptography.
[10] Matthew Green,et al. Outsourcing the Decryption of ABE Ciphertexts , 2011, USENIX Security Symposium.
[11] Taher El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.
[12] Joonsang Baek,et al. Identity-Based Threshold Decryption , 2004, Public Key Cryptography.
[13] Jean-Jacques Quisquater,et al. Efficient revocation and threshold pairing based cryptosystems , 2003, PODC '03.
[14] Hui Cui,et al. (Dual) server-aided revocable attribute-based encryption with decryption key exposure resistance , 2019, Inf. Sci..
[15] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[16] Jin Li,et al. Identity-Based Encryption with Outsourced Revocation in Cloud Computing , 2015, IEEE Transactions on Computers.
[17] Allison Bishop,et al. Decentralizing Attribute-Based Encryption , 2011, IACR Cryptol. ePrint Arch..
[18] Moni Naor,et al. Revocation and Tracing Schemes for Stateless Receivers , 2001, CRYPTO.
[19] Joseph K. Liu,et al. An Efficient Cloud-Based Revocable Identity-Based Proxy Re-encryption Scheme for Public Clouds Data Sharing , 2014, ESORICS.
[20] Dan Boneh,et al. A Method for Fast Revocation of Public Key Certificates and Security Capabilities , 2001, USENIX Security Symposium.
[21] Máté Horváth,et al. Attribute-Based Encryption Optimized for Cloud Computing , 2015, IACR Cryptol. ePrint Arch..
[22] Qinyi Li,et al. Broadcast revocation scheme in composite-order bilinear group and its application to attribute-based encryption , 2013, Int. J. Secur. Networks.
[23] Vipul Goyal,et al. Identity-based encryption with efficient revocation , 2008, IACR Cryptol. ePrint Arch..
[24] Brent Waters,et al. Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption , 2012, IACR Cryptol. ePrint Arch..
[25] Bernard P. Zajac. Applied cryptography: Protocols, algorithms, and source code in C , 1994 .
[26] Robert H. Deng,et al. Revocable and Decentralized Attribute-Based Encryption , 2016, Comput. J..
[27] Robert H. Deng,et al. Server-Aided Revocable Attribute-Based Encryption , 2016, ESORICS.
[28] Yanjiang Yang,et al. Achieving Revocable Fine-Grained Cryptographic Access Control over Cloud Data , 2013, ISC.
[29] Robert H. Deng,et al. Server-Aided Revocable Identity-Based Encryption , 2015, ESORICS.
[30] Yi Mu,et al. Revocable attribute-based encryption with decryption key exposure resistance and ciphertext delegation , 2019, Inf. Sci..
[31] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[32] Ian Miers,et al. Charm: a framework for rapidly prototyping cryptosystems , 2013, Journal of Cryptographic Engineering.
[33] Hideki Imai,et al. Conjunctive Broadcast and Attribute-Based Encryption , 2009, Pairing.
[34] Mohsen Toorani,et al. SMEmail - A New Protocol for the Secure E-mail in Mobile Environments , 2008, 2008 Australasian Telecommunication Networks and Applications Conference.