Flexible CP-ABE Based Access Control on Encrypted Data for Mobile Users in Hybrid Cloud System
暂无分享,去创建一个
Qiaoyan Wen | Hua Zhang | Shuo Zhang | Xuelei Li | Wenmin Li | Hua Zhang | Xuelei Li | Wen-Min Li | Q. Wen | Shuo Zhang
[1] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[2] Mukesh Singhal,et al. Collaboration in multicloud computing environments: Framework and security issues , 2013, Computer.
[3] Amit Sahai,et al. Bounded Ciphertext Policy Attribute Based Encryption , 2008, ICALP.
[4] Vijay Varadharajan,et al. Achieving Secure Role-Based Access Control on Encrypted Data in Cloud Storage , 2013, IEEE Transactions on Information Forensics and Security.
[5] Allison Bishop,et al. Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption , 2010, EUROCRYPT.
[6] Ling Cheung,et al. Provably secure ciphertext policy ABE , 2007, CCS '07.
[7] Nuttapong Attrapadung,et al. Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts , 2011, Public Key Cryptography.
[8] Xuejiao Liu,et al. A Secure and Efficient Data Sharing Framework with Delegated Capabilities in Hybrid Cloud , 2015, 2015 International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec).
[9] Jin Li,et al. Outsourcing Encryption of Attribute-Based Encryption with MapReduce , 2012, ICICS.
[10] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[11] R.T.Subhalakshmi,et al. Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-Based Encryption , 2016 .
[12] Brent Waters,et al. Secure attribute-based systems , 2006, CCS '06.
[13] Dusit Niyato,et al. A Framework for Cooperative Resource Management in Mobile Cloud Computing , 2013, IEEE Journal on Selected Areas in Communications.
[14] Cong Wang,et al. Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.
[15] Timothy Grance,et al. Guidelines on Security and Privacy in Public Cloud Computing | NIST , 2012 .
[16] Bernd Grobauer,et al. Understanding Cloud Computing Vulnerabilities , 2011, IEEE Security & Privacy.
[17] Matthew Green,et al. Outsourcing the Decryption of ABE Ciphertexts , 2011, USENIX Security Symposium.
[18] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[19] Qiaoyan Wen,et al. Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing , 2016, IEEE Transactions on Parallel and Distributed Systems.
[20] Dong Kun Noh,et al. Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems , 2011, IEEE Transactions on Parallel and Distributed Systems.
[21] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization , 2011, Public Key Cryptography.
[22] Jonathan Katz,et al. Chosen-Ciphertext Security from Identity-Based Encryption , 2004, SIAM J. Comput..
[23] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[24] Matt Blaze,et al. Divertible Protocols and Atomic Proxy Cryptography , 1998, EUROCRYPT.
[25] Brent Waters,et al. Practical constructions and new proof methods for large universe attribute-based encryption , 2013, CCS.
[26] Gail-Joon Ahn,et al. Security and Privacy Challenges in Cloud Computing Environments , 2010, IEEE Security & Privacy.
[27] Allison Bishop,et al. Decentralizing Attribute-Based Encryption , 2011, IACR Cryptol. ePrint Arch..
[28] G. Ravi,et al. Attribute Based Encryption With Verifiable Outsourced Decryption , 2014 .
[29] Rafail Ostrovsky,et al. Attribute-based encryption with non-monotonic access structures , 2007, CCS '07.