Verifiable Outsourced Attribute Based Encryption Scheme with Fixed Key Size
暂无分享,去创建一个
[1] Matthew Green,et al. Outsourcing the Decryption of ABE Ciphertexts , 2011, USENIX Security Symposium.
[2] Robert H. Deng,et al. Attribute-Based Encryption With Efficient Verifiable Outsourced Decryption , 2015, IEEE Transactions on Information Forensics and Security.
[3] Nik Bessis,et al. CS-PSO: chaotic particle swarm optimization algorithm for solving combinatorial optimization problems , 2016, Soft Computing.
[4] Jin Li,et al. Securely Outsourcing Attribute-Based Encryption with Checkability , 2014, IEEE Transactions on Parallel and Distributed Systems.
[5] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[6] Robert H. Deng,et al. Adaptable Ciphertext-Policy Attribute-Based Encryption , 2013, Pairing.
[7] Amit Sahai,et al. Bounded Ciphertext Policy Attribute Based Encryption , 2008, ICALP.
[8] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[9] Zhou Su,et al. An Efficient and Fine-Grained Big Data Access Control Scheme With Privacy-Preserving Policy , 2017, IEEE Internet of Things Journal.
[10] Derong Liu,et al. Optimization of electricity consumption in office buildings based on adaptive dynamic programming , 2017, Soft Comput..
[11] Jing Li,et al. Fuzzy encryption in cloud computation: efficient verifiable outsourced attribute-based encryption , 2017, Soft Computing.
[12] Hao Wang,et al. Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing , 2016, Soft Computing.
[13] Jin Li,et al. Outsourcing Encryption of Attribute-Based Encryption with MapReduce , 2012, ICICS.
[14] Zhibin Zhou,et al. Efficient and secure data storage operations for mobile cloud computing , 2012, 2012 8th international conference on network and service management (cnsm) and 2012 workshop on systems virtualiztion management (svm).
[15] Liu Meng-ju. Optimizing the Decryption Efficiency in LSSS Matrix-Based Attribute-Based Encryption Without Given Policy , 2015 .
[16] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization , 2011, Public Key Cryptography.