References
- R. Buyya, C . ShinYeo, J. Broberg and I. Brandic. "Cloud computing and emerging it platforms: vision, hype, and reality for delivering computing as the 5th utility," Future Generation Computer Systems, vol. 25, no 6, pp. 599-616, June, 2009. https://doi.org/10.1016/j.future.2008.12.001
- J.M. Do, Y.J. Song and N. Park. "Attribute Based Proxy Re-encryption for Data Confidentiality in Cloud Computing Environments", in Proc. of 2011 First ACIS/JNU International Conference on Computers, Networks, Systems and Industrial Engineering(cnsi), Berlin, Springer-Verlag, pp. 248-251, May-23-25, 2011.
- A. Sahai, B. Waters. "Fuzzy Identity-Based Encryption," in Proc. of EUROCRYPT 2005, vol. 3494, Berlin, Springer-Verlag, pp. 457-473, May 22-26, 2005.
- V. Goyal, O. Pandey, A. Sahai, etal. "Attribute-based encryption for fine grained access control of encrypted data," in Proc. of the 13th ACM Conference on Computer and Communications Security, CCS 2006, ACM Press, pp. 72-81, October 30-November 3, 2006.
- S. Yu, C. Wang, K. Ren etal. "Achieving secure, scalable, and fine-grained data access control in cloud computing," in Proc. of IEEE INFOCOM, pp. 534-542, March 14-19, 2010.
- L. Ibraimi, Q. Tang and P. Hartel etal. "Efficient and provable secure ciphertext-policy attribute-based encryption schemes," in Proc. of the Information Security Practice and Experience, Berlin, Springer-Verlag, pp.1−12, April 13-15, 2009.
- N. Attrapadung, H. Imai. "Dual-Policy attribute based encryption," in Proc. of the Applied Cryptography and Network Security (ACNS). Berlin, Springer-Verlag, pp.168−185, June 2-5, 2009.
- A. Lewko, T. Okamoto and A Sahai, etal. "Fully secure functional encryption: Attribute-Based encryption and (hierarchical) inner product encryption," in Proc. of Advances in Cryptology-EUROCRYPT 2010, LNCS 6110, Berlin, Springer-Verlag, pp. 62−91, May 30- June 3, 2010.
- D. Boneh, X. Boyen and E. Goh. "Hierarchical identity based encryption with constant size ciphertext," in Proc. of Advances in EUROCRYPT, vol. 3494, Berlin, Springer-Verlag, pp. 440-456, May 22-26, 2005.
- L.Y. Zhang, Y.P. Hu, Q. Wu. "Hierarchical Identity-Based Encryption with Constant size private keys," ETRI Journal, 34(1), pp.142-145, February 2012. https://doi.org/10.4218/etrij.12.0211.0140
- B. Waters. "Dual key encryption: Realizing fully secure IBE and HIBE under simple assumption," in Proc of Advances in cryptology-CRYPTO, vol. 5677, Berlin, Springer-Verlag, pp. 619-636, August 16-20, 2009.
- D. Cash, D. Hofheinz and E. Kiltz. "How to Delegate a Lattice Basis," Journal of Cryptology, vol. 25, no. 4, pp 601-639, October 2012. https://doi.org/10.1007/s00145-011-9105-2
- G. Wang, Q. Liu and J. Wu. "Hierarchical attribute-based encryption for fine-grained access control in cloud storage services," in Proc. of ACM Conference on Computer and Communications Security (CCS)-2010 (Poster), ACM Press, pp. 735-737, October 4-8, 2010.
- G. Wang, Q. Liu and J. Wu, et al. "Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers." Computers and Security, vol. 30, no. 5, pp. 320-331, July 2011.
- R. Canetti, O. Goldreich and S. Halevi. "The random oracle methodology," Journal of ACM, vol. 51, no 4, pp. 557-594, July 2004. https://doi.org/10.1145/1008731.1008734
- J. Liu, Z.G. Wan and M. Gu. "Hierarchical Attribute-Set Based Encryption for Scalable, Flexibleand Fine-Grained Access Control in Cloud Computing," in Proc. of the Information Security Practice and Experience.-ISPEC, vol. 6672, Berlin, Springer-Verlag, pp. 98-107, May 30- June 1, 2011.
- Z. B. Zhou, D. J. Huang. "On Efficient Ciphertext-Policy Attribute Based Encryption and Broadcast Encryption," in Proc. of ACM Conference on Computer and Communications Security (CCS), ACM Press, pp. 753-755, October 4-8, 2010.
- E. Kiltz. "Chosen-ciphertext security from tag-based encryption," in Proc. of TCC 2006: 3rd Theory of Cryptography Conference, Berlin, Springer-Verlag, LNCS 3876, pp. 581-600, March 4-7, 2006.
Cited by
- An Improved Privacy Preserving Construction for Data Integrity Verification in Cloud Storage vol.8, pp.10, 2013, https://doi.org/10.3837/tiis.2014.10.019
- Computational Analytics of Client Awareness for Mobile Application Offloading with Cloud Migration vol.8, pp.11, 2013, https://doi.org/10.3837/tiis.2014.11.014
- Ciphertext policy attribute-based encryption supporting unbounded attribute space from R-LWE vol.11, pp.4, 2017, https://doi.org/10.3837/tiis.2017.04.025