메뉴 건너뛰기




Volumn , Issue , 2012, Pages 105-116

Comparison-based encryption for fine-grained access control in clouds

Author keywords

access control; attribute based encryption; cloud; cryptography; dual decryption; integer comparison

Indexed keywords

COMPUTATIONAL OVERHEADS; DATA ACCESS; DECRYPTION OPERATIONS; DUAL DECRYPTION; ENCRYPTION SCHEMES; INTEGER COMPARISON; RANGE CONSTRAINTS; SECURITY MECHANISM; SECURITY STRENGTHS;

EID: 84863269353     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2133601.2133614     Document Type: Conference Paper
Times cited : (37)

References (20)
  • 6
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • Advances in Cryptology (CRYPTO'2001)
    • D. Boneh and M. Franklin. Identity-based encryption from the weil pairing . In Advances in Cryptology (CRYPTO'2001), volume 2139 of LNCS, pages 213-229, 2001.
    • (2001) LNCS , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 7
    • 24144433396 scopus 로고    scopus 로고
    • Evaluating2- Dnf formulas on ciphertexts
    • J. Kilian, editor, TCC, Springer
    • D. Boneh, E.-J. Goh, and K. Nissim. Evaluating2- dnf formulas on ciphertexts. In J. Kilian, editor, TCC, volume 3378 of Lecture Notes in Computer Science, pages 325-341. Springer, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3378 , pp. 325-341
    • Boneh, D.1    Goh, E.-J.2    Nissim, K.3
  • 9
    • 49049111604 scopus 로고    scopus 로고
    • Bounded ciphertext policy attribute based encryption
    • V. Goyal, A. Jain, O. Pandey, and A. Sahai. Bounded ciphertext policy attribute based encryption. In ICALP (2), pages 579-591, 2008.
    • (2008) ICALP , Issue.2 , pp. 579-591
    • Goyal, V.1    Jain, A.2    Pandey, O.3    Sahai, A.4
  • 11
    • 0242625197 scopus 로고    scopus 로고
    • Cryptographic access control in a distributed file system
    • ACM
    • A. Harrington and C. D. Jensen. Cryptographic access control in a distributed file system. In SACMAT, pag es 158-165. ACM, 2003.
    • (2003) SACMAT , pp. 158-165
    • Harrington, A.1    Jensen, C.D.2
  • 12
    • 70350630621 scopus 로고    scopus 로고
    • Efficient and provable secure ciphertext-policy attribute-based encryption schemes
    • L. Ibraimi, Q. Tang, P. H. Hartel, and W. Jonker. Efficient and provable secure ciphertext-policy attribute-based encryption schemes. In ISPEC, pages 1-12, 2009.
    • (2009) ISPEC , pp. 1-12
    • Ibraimi, L.1    Tang, Q.2    Hartel, P.H.3    Jonker, W.4
  • 15
    • 77958029458 scopus 로고    scopus 로고
    • Time-specific encryption
    • J. Garay and R. De Prisco, editors, Security and Cryptography for Networks, Springer Berlin / Heidelberg
    • K. Paterson and E. Quaglia. Time-specific encryption. In J. Garay and R. De Prisco, editors, Security and Cryptography for Networks, volume 6280 of Lecture Notes in Computer Science, pages 1-16. Springer Berlin / Heidelberg, 2010.
    • (2010) Lecture Notes in Computer Science , vol.6280 , pp. 1-16
    • Paterson, K.1    Quaglia, E.2
  • 16
    • 24944554962 scopus 로고    scopus 로고
    • Fuzzy identity-based encryption
    • A. Sahai and B. Waters. Fuzzy identity-based encryption. In EUROCRYPT, pages 457-473, 2005.
    • (2005) EUROCRYPT , pp. 457-473
    • Sahai, A.1    Waters, B.2
  • 17
    • 34548050702 scopus 로고    scopus 로고
    • New constructions for provably-secure time-bound hierarchical key assignment schemes
    • A. D. Santis, A. L. Ferrara, and B. Masucci. New constructions for provably-secure time-bound hierarchical key assignment schemes. In SACMAT, pages 133-138, 2007.
    • (2007) SACMAT , pp. 133-138
    • Santis, A.D.1    Ferrara, A.L.2    Masucci, B.3
  • 19
    • 0036187601 scopus 로고    scopus 로고
    • A time-bound cryptographic key assignment scheme for access control in a hierarchy
    • DOI 10.1109/69.979981
    • W. Tzeng. A time-bound cryptographic key assignment scheme for access control in a hierarchy. IEEE Trans. on Knowledge and Data Engineering, 14(1):182-188, 2002. (Pubitemid 34198202)
    • (2002) IEEE Transactions on Knowledge and Data Engineering , vol.14 , Issue.1 , pp. 182-188
    • Tzeng, W.-G.1
  • 20
    • 77953310709 scopus 로고    scopus 로고
    • Achieving secure, scalable, and fine-grained data access control in cloud computing
    • S. Yu, C. Wang, K. Ren, and W. Lou. Achieving secure, scalable, and fine-grained data access control in cloud computing. In INFOCOM, pages 534-542, 2010.
    • (2010) INFOCOM , pp. 534-542
    • Yu, S.1    Wang, C.2    Ren, K.3    Lou, W.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.