Computer Science ›› 2017, Vol. 44 ›› Issue (5): 160-165.doi: 10.11896/j.issn.1002-137X.2017.05.028
Previous Articles Next Articles
MA Xiao-xiao and YU Gang
[1] SAHAI A,WATERS B.Fuzzy identity based encryption [C]∥Advances in Cryptology-EUROCRYPT 2005,LNCS 3494.Springer-Verlag,2005:457-473. [2] GOYAL V,PANDEY O,SAHAI A,et al.Attribute-based encryption for fine-grained access control of encrypted data [C]∥Proceedings of the 13th ACM Conference on Computer and Communications Security.ACM,2006:89-98. [3] OSTROVSKY R,SAHAI A,WATERS B.Attribute-based en-cryption with non-monotonic access structures[C]∥Procee-dings of ACM Conference on Computer and Communication Security-CCS 2007.ACM Press,2007:195-203. [4] LEWKO A,OKAMOTO T,SAHAI A,et al.Fully secure functional encryption:attribute-based encryption and (hierarchical) inner product encryption [C]∥Advances in Cryptology-EUROCRYPT 2010,LNCS 6110.Springer-Verlag,2010:62-91. [5] OKAMOTO T,TAKASHIMA K.Fully secure functional encryption with general relations from the decisional linear assumption[C]∥Advances in Cryptology-CRYPTO 2010.Sprin-ger-Verlag,2010:191-208. [6] HERRANZ J,LAGUILLAUMIE F,RAFOLS C.Constant-size ciphertext in threshold attribute-based encryption [C]∥Proceedings of Public Key Cryptology-PKC 2010,LNCS 6056.Springer-Verlag,2010:19-34. [7] WATERS B.Ciphertext-policy attribute-based encryption:Anexpressive,efficient,and provably secure realization [C]∥Public Key Cryptography- PKC 2011.Springer Berlin Heidelberg,2011:53-70. [8] YAMADA S,ATTRAPADUNG N,H ANAOKA G,et al.Generic constructions for chosen ciphertext secure attribute based encryption [C]∥Proceedings of Public Key Cryptology- PKC 2011,LNCS 6571.Springer-Verlag,2011:71-89. [9] LEWKO A,WATERS B.New proof methods for attribute-based encryption:achieving full security through selective techniques [C]∥Advances in Cryptology-CRYPTO 2012,LNCS 7417.Springer-Verlag,2012:180-198. [10] HOHENBERGER S,WATERS B.Attribute based encryption:with fast decryption [C]∥Proceedings of Public Key Cryptology-PKC 2013.Springer-Verlag,2013:162-179. [11] ROUSELAKIS Y,WATERS B.Practical constructions and new proof methods for large universe attribute-based encryption [C]∥Proceedings of the 2013 ACM SIGSAC Conference on Computer &Communications Security.ACM,2013:463-474. [12] NARUSE T,MOHRI M,SHIRAISHI Y.Attribute-based en-cryption with attribute revocation and grant function using proxy re-encryption and attribute key for updating[M]∥Future Information Technology.2014:119-125. [13] QIAN H,LI J,ZHANG Y,et al.Privacy Preserving PersonalHealth Record Using Multi-Authority Attribute-Based Encryption with Revocation[J].International Journal of Information Security,2015,14(6):487-497. [14] ZHANG K,GONG J,TANG S,et al.Practical and Efficient Attribute-Based Encryption with Constant-Size Ciphertexts in Outsourced Verifiable Computation[C]∥Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security.ACM,2016:269-279. [15] SHI Y,ZHENG Q,LIU J,et al.Directly revocable key-policy attribute-based encryption with verifiable ciphertext delegation[J].Information Sciences,2015,295:221-231. [16] HINEK M J,JIANG S,SAFAVI-NAINI R,et al.Attribute-based encryption with key cloning protection [J].Bulltein of the Korean Mathematical Society,2008,2008(4):803-819. [17] YU S,REN K,LOU W,et al.Defending against key abuse attacks in KP-ABE enabled broadcast systems [C]∥Security and Privacy in Communication Networks.Springer Berlin Heidelberg,2009:311-329. [18] LI J,REN K,KIM K.A2BE:Accountable attribute-based en-cryption for abuse free access control[EB/OL].[2009-03-11].http://eprint.iacr.org/2009/118. [19] KATZ J,SCHRODER D.Tracing insider attacks in the context of predicate encryption schemes[EB/ OL].https:// www.usukita.org/node/1779. [20] LIU Z,CAO Z,WONG D S.White-box traceable ciphertext-po-licy attribute-based encryption supporting any monotone access structures[J].IEEE Transactions on Information Forensics and Security,2013,8(1):76-88. [21] NING J,DONG X,CAO Z,et al.White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Flexible Attributes[J].IEEE Transactions on Information Forensics and Security,2015,10(6):1274-1288. [22] ZHANG X,JIN C,WEN Z,et al.Attribute-Based Encryptionwithout Key Escrow[C]∥Cloud Computing and Security 2015,LNCS 9483.Springer-Verlag,2015:74-87. [23] BONEH D,LYNN B,SHACHAM H.Short signatures from the Weil pairing [C]∥Advances in Cryptology—ASIACRYPT 2001.Springer Berlin Heidelberg,2001:514-532. [24] POINTCHEVAL D,STERN J.Security arguments for digital signatures and blind signature[J].Journal of Cryptology,2000,13(3):361-396. |
No related articles found! |
|