Acknowledgement
Supported by : National key Research Program of China
References
- R. Buyya, C. S. Yeo, S. Venugopal and et al, "Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility," Future Generation computer systems, vol. 25, no. 6, pp. 599-616, June, 2009. https://doi.org/10.1016/j.future.2008.12.001
- A. Sahai and B. Waters, "Fuzzy identity-based encryption," in Proc. of Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 457-473, May 22-26, 2005.
- V. Goyal, O. Pandey, A. Sahai and B. Waters, "Attribute-based encryption for fine-grained access control of encrypted data," in Proc. of the 13th ACM conference on Computer and communications security, pp. 89-98, October 30-November 3, 2006.
- J. Bethencourt, A. Sahai and B. Waters, "Ciphertext-policy attribute-based encryption," in Proc. of IEEE symposium on security and privacy, pp. 321-334, May 20-23, 2007.
- Y. Rouselakis and B. Waters, "Practical constructions and new proof methods for large universe attribute-based encryption," in Proc. of the 2013 ACM SIGSAC conference on Computer & communications security, pp. 463-474, November 4-8, 2013.
- K. Emura, A. Miyaji, A. Nomura and et al, "A ciphertext-policy attribute-based encryption scheme with constant ciphertext length," in Proc. of International Conference on Information Security Practice and Experience, pp. 13-23, April 13-15, 2009.
- A. Lewko, T. Okamoto, A. Sahai and et al, "Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption," in Proc. of Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 62-91, May 30-June 3, 2010.
- Y. Fang, Z. Wen, Q. Shen and et al, "POSTER: Ciphertext-policy attribute-based encryption method with secure decryption key generation and outsourcing decryption of ABE ciphertexts," in Proc. of International Conference on Security and Privacy in Communication Systems, pp. 585-589, October 26-29, 2015.
- K. Zhang, J. Ma, J. Liu and H. Li, "Adaptively secure multi-authority attribute-based encryption with verifiable outsourced decryption," Science China Information Sciences, vol. 59, no. 9, pp. 99-105, September, 2016.
- H. Wang, D. He, J. Shen and et al, "Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing," Soft Computing, pp. 1-11, July, 2016.
- M. Green, S. Hohenberger and B. Waters, "Outsourcing the decryption of ABE ciphertexts," in Proc. of USENIX Security Symposium, pp.34-34, August 8-12, 2011.
- D. Benjamin and M. J. Atallah, "Private and cheating-free outsourcing of algebraic computations," in Proc. of Sixth Annual Conference on Privacy, Security and Trust, pp. 240-245, October 1-3, 2008.
- J. Li, C. Jia, J. Li and X. Chen, "Outsourcing encryption of attribute-based encryption with mapreduce," in Proc. of International Conference on Information and Communications Security, pp. 191-201, Otober 29-31, 2012.
- J. Li, X. Chen, J. Li and et al, "Fine-grained access control system based on outsourced attribute-based encryption," in Proc. of European Symposium on Research in Computer Security, pp. 592-609, September 9-13, 2013.
- Z. Zhou and D. Huang, "Efficient and secure data storage operations for mobile cloud computing," in Proc. of the 8th International Conference on Network and Service Management, pp. 37-45, October 22-26, 2012.
- J. Li, X. Huang, J. Li and et al, "Securely outsourcing attribute-based encryption with checkability," IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 8, pp. 2201-2210, August, 2014. https://doi.org/10.1109/TPDS.2013.271
- F. Armknecht, J. M. Bohli, G. O. Karame and et al, "Outsourced proofs of retrievability," in Proc. of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 831-843, November 3-7, 2014.
- J. Lai, R. H. Deng, C. Guan and J. Wang, "Attribute-based encryption with verifiable outsourced decryption," IEEE Transactions on information forensics and security, vol. 8, no. 8, pp. 1343-1354, August, 2013. https://doi.org/10.1109/TIFS.2013.2271848
- J. Li, F. Sha, Y. Zhang and et al, "Verifiable outsourced decryption of attribute-based encryption with constant ciphertext length," Security and Communication Networks, vol. 2017, no. 2017, January, 2017.
- Q. Chai and G. Gong, "Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers," in Proc. of IEEE International Conference on Communications, pp. 917-922, June 10-15, 2012.
- L. Trevisan and S. Vadhan, "Extracting randomness from samplable distributions," in Proc. of 41st Annual Symposium on Foundations of Computer Science, pp. 32-42, November 12-14, 2000.
- Y. Dodis, R. Ostrovsky, L. Reyzin and A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data," SIAM journal on computing, vol. 38, no. 1, pp. 97- 139, March, 2008. https://doi.org/10.1137/060651380
- B. Lynn, The pairing-based cryptography (PBC) library[OL]. http://crypto.stanford.edu/pbc. 2006.