References
- V. Goyal, O. Pandey, A. Sahai and B. Waters, "Attribute Based Encryption for Fine-Grained Access Control of Encrypted Data," in Proc. of ACM conference on Computer and Communications Security, pp. 89-98.Oct.30-Nov.3, 2006.
- Han ND, Han LZ, Tuan DM, In HP, Jo M, "A scheme for Data Confidentiality in Cloud-assisted Wireless Body Area Networks," Information Sciences, vol. 284, no.10, pp 157-166, Nov.,2013.
- Waters, B., "Ciphertext policy attribute based encryption: an expressive, efficient, and provably secure realization," in Proc. of Int. Conf. PKC 2011, pp. 53-70, Mar. 6-9, 2011.
- A. Lewko, T. Okamoto, A. Sahai, K. Takashima, and B. Waters, "Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption," in Proc. of Advances in Cryptology-EUROCRYPT 2010, pp. 62-91, Springer, Berlin, Germany, May 30-Jun.3,2010.
- A. Lewko and B. Waters, "Decentralizing attribute-based encryption," in Proc. of Advances in Cryptology-EUROCRYPT 2011, pp.568-588, May 15-19, 2011.
- M.Green, S. Hohenberger, B.Waters, "Outsourcing the decryption of ABE ciphertexts," in Proc. of the 20th USENIX conference on Security (SEC'11), Berkeley, CA, USA, 2011.
- J. Han, W. Susilo, Y. Mu, and J. Yan, "Privacy-preserving decentralized key-policy attribute-based encryption," in Proc. of 2012 IEEE Transactions on Parallel and Distributed Systems, vol.23, no.11, pp.2150-2162, Nov.,2012.
- Li J, Ren K, Zhu B, "Privacy-Aware Attribute-Based Encryption with User Accountability," Volume 5735 of the series Lecture Notes in Computer Science, pp. 347-362,Sep.7-9,2009.
-
Y. Zheng, "Digital Signcryption or How to Achieve Cost (Signature &Encryption)
- Hong HS, Sun ZX, "An efficient and secure attribute based signcryption scheme with LSSS access structure," SpringerPlus, vol.5, no.1, pp.1-10, Dec., 2016. https://doi.org/10.1186/s40064-015-1659-2
- Wang CJ, Huang JS, "Attribute based Signcryption with Ciphertext policy and Claim predicate Mechanism," in Proc. of 2011 Seventh International Conference on Computational Intelligence and Security, pp. 905-909, Sanya, China, Dec. 3-4, 2011.
- Hu CQ, Zhang N, "Body Area Network Security: A Fuzzy Attribute-Based Signcryption Scheme," IEEE Journal on Selected Areas in Communications/SUPPLEMENT, vol.31, no.9, pp 37-46, Sep., 2013. https://doi.org/10.1109/JSAC.2013.SUP.0513004
- Lai JZ, Deng Robert, Guan CW, "Attribute-Based Encryption With Verifiable Outsourced Decryption," IEEE Transactions on Information Forensics and Security ,vol 8,no 8, pp 1343 - 1354, Aug., 2013. https://doi.org/10.1109/TIFS.2013.2271848
- Qin BD, Deng Robert, et al., "Attribute-Based Encryption with Efficient Verifiable Outsourced Decryption," IEEE Transactions on Information Forensics and Security, vol.10, no.7, pp 1384-1393, Jul., 2015. https://doi.org/10.1109/TIFS.2015.2410137
- Liu ZS, Yan HY, Li ZK, "Server-aided anonymous attribute-based authentication in cloud computing," Future Generation Computer Systems, vol 52, pp 61-66, Feb. 2015. https://doi.org/10.1016/j.future.2014.12.001
- Ma H, Zhang R, Wan ZG, et al., "Verifiable and Exculpable Outsourced Attribute-Based Encryption for Access Control in Cloud Computing," IEEE Transactions on Dependable and Secure Computing,online, Nov., 2015.
- Fang YJ, Wen ZL, Shen QN, et al., "POSTER: Ciphertext-Policy Attribute-Based Encryption Method with Secure Decryption Key Generation and Outsourcing Decryption of ABE Ciphertexts," Volume 164 of the series Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, pp 585-589,Jan.,2016.
- Hong HS, Zhixin Sun and Ximeng Liu, "A key-insulated CP-ABE with key exposure accountability for secure data sharing in the cloud," KSII Transactions on Internet and Information Systems, vol. 10, no. 5, pp. 2394-2406, May., 2016. https://doi.org/10.3837/tiis.2016.05.024
- Chen L, Cheng Z, and Smart N P., "Identity-based key agreement protocols from Pairings," International Journal of Information security, vol.6, no.4, pp. 213-241, Jul., 2007. https://doi.org/10.1007/s10207-006-0011-9
- Attrapadung N, Libert B, De Panafieu E., "Expressive key-policy attribute-based encryption with constant-size ciphertexts," in Proc. of Public Key Cryptography-PKC 2011, vol. 6571 of LNCS. Springer, pp. 90-108, Mar. 6-9, 2011.
- Hong HS, Sun ZX, "High efficient key-insulated attribute based encryption scheme without bilinear pairing operations," SpringerPlus, vol.5, no.1, pp.1-12, Dec., 2016. https://doi.org/10.1186/s40064-015-1659-2
- P.Vijayakumar, M.Azees, A.Kannan, L.Jegatha Deborah, "Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad-hoc Networks," IEEE Transactions on Intelligent Transportation Systems, vol.17, no.4, 1015 - 1028, 2016. https://doi.org/10.1109/TITS.2015.2492981
- P.Vijayakumar, R.Naresh, L. Jegatha Deborah, SK Hafizul Islam, "Computation Cost Efficient Group Key Agreement Protocol for Secure Peer to Peer Communication," Security and Communication Networks, Wiley, Accepted for Publication, DOI:10.1002/Sec.1578. 2016.
- P.Vijayakumar, R.Naresh, SK Hafizul Islam, L. Jegatha Deborah "An Effective Key Distribution for Secure Internet Pay-TV using Access Key Hierarchies," Security and Communication Networks, Wiley,. DOI: 10.1002/sec.1680. Oct. 2016.
- P.Vijayakumar, S. Bose, A. Kannan, L.Jegatha Deborah, "Computation and Communication Efficient Key Distribution Protocol for Secure Multicast Communication," KSII Transactions on Internet and Information Systems, Vol.7, No.4, pp.878-894, 2013. https://doi.org/10.3837/tiis.2013.04.016
- Minho Jo, Nguyen Thi Thanh Huyen, Dung Nguyen, Eui-nam Huh., "A Beneficial Analysis of Deployment Knowledge for Key Distribution in Wireless Sensor Networks," Security and Communication Networks, vol.5, no.5 pp.485-495, May., 2012. https://doi.org/10.1002/sec.337
- Guo ZZ, Li MC, Fan XX, "Attribute-based ring signcryption scheme," Security and Communication Networks, vol.6, no.6, pp.790-796, Jun., 2013. https://doi.org/10.1002/sec.614
- Wei J, Hu X, Liu W., "Traceable attribute-based signcryption," Security and Communication Networks, vol.7, no.12, pp. 2302-2317, Dec. 2015. https://doi.org/10.1002/sec.940