메뉴 건너뛰기




Volumn , Issue , 2012, Pages 536-545

Attributed-based access control for multi-authority systems in cloud storage

Author keywords

Access control; Attribute revocation; Cloud storage; CP ABE; Multi authority

Indexed keywords

ACCESS CONTROL SCHEMES; ACCESS STRUCTURE; ANALYSIS AND SIMULATION; ATTRIBUTE REVOCATION; CONTROL FRAMEWORK; CP-ABE; DATA ACCESS CONTROL; MULTI-AUTHORITY; RANDOM ORACLE MODEL;

EID: 84866926275     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICDCS.2012.42     Document Type: Conference Paper
Times cited : (113)

References (31)
  • 3
    • 79952521560 scopus 로고    scopus 로고
    • Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization
    • B. Waters, "Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization," Public Key Cryptography- PKC 2011, pp. 53-70, 2011.
    • (2011) Public Key Cryptography- PKC 2011, Pp , pp. 53-70
    • Waters, B.1
  • 7
    • 38049078557 scopus 로고    scopus 로고
    • Multi-authority attribute based encryption
    • M. Chase, "Multi-authority attribute based encryption," Theory of Cryptography, vol. 4392, pp. 515-534, 2007.
    • (2007) Theory of Cryptography , vol.4392 , pp. 515-534
    • Chase, M.1
  • 12
    • 84866886600 scopus 로고    scopus 로고
    • Attribute-based access control with efficient revocation in data outsourcing systems
    • J. Hur and D. Noh, "Attribute-based access control with efficient revocation in data outsourcing systems," IEEE Transactions on Parallel and Distributed Systems, 2010.
    • (2010) IEEE Transactions on Parallel and Distributed Systems
    • Hur, J.1    Noh, D.2
  • 16
    • 84880852861 scopus 로고    scopus 로고
    • Revocation and tracing schemes for stateless receivers
    • Springer
    • D. Naor, M. Naor, and J. Lotspiech, "Revocation and tracing schemes for stateless receivers," in Advances in Cryptology-CRYPTO 2001. Springer, 2001, pp. 41-62.
    • (2001) Advances in Cryptology-CRYPTO 2001 , pp. 41-62
    • Naor, D.1    Naor, M.2    Lotspiech, J.3
  • 17
    • 0034216176 scopus 로고    scopus 로고
    • Minimizing number of wavelengths in multicast routing trees in wdm networks
    • D. Li, X. Du, X. Hu, L. Ruan, and X. Jia, "Minimizing number of wavelengths in multicast routing trees in wdm networks," Networks, vol. 35, no. 4, pp. 260-265, 2000.
    • (2000) Networks , vol.35 , Issue.4 , pp. 260-265
    • Li, D.1    Du, X.2    Hu, X.3    Ruan, L.4    Jia, X.5
  • 24
    • 77950867637 scopus 로고    scopus 로고
    • Secure threshold multi authority attribute based encryption without a central authority
    • H. Lin, Z. Cao, X. Liang, and J. Shao, "Secure threshold multi authority attribute based encryption without a central authority," Information Sciences, vol. 180, no. 13, pp. 2618-2632, 2010.
    • (2010) Information Sciences , vol.180 , Issue.13 , pp. 2618-2632
    • Lin, H.1    Cao, Z.2    Liang, X.3    Shao, J.4
  • 27
    • 79957599737 scopus 로고    scopus 로고
    • Ciphertext policy attribute based encryption with efficient revocation
    • University of Waterloo
    • X. Liang, R. Lu, and X. Lin, "Ciphertext policy attribute based encryption with efficient revocation," University of Waterloo, Tech. Rep., 2011.
    • (2011) Tech. Rep.
    • Liang, X.1    Lu, R.2    Lin, X.3
  • 29
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • Springer
    • A. Shamir, "Identity-based cryptosystems and signature schemes," in Advances in cryptology. Springer, 1985, pp. 47-53.
    • (1985) Advances in Cryptology , pp. 47-53
    • Shamir, A.1
  • 30
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • Springer
    • D. Boneh and M. Franklin, "Identity-based encryption from the weil pairing," in Advances in Cryptology-CRYPTO 2001. Springer, 2001, pp. 213-229.
    • (2001) Advances in Cryptology-CRYPTO 2001 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 31
    • 77950151506 scopus 로고    scopus 로고
    • An identity based encryption scheme based on quadratic residues
    • C. Cocks, "An identity based encryption scheme based on quadratic residues," Cryptography and Coding, pp. 360-363, 2001.
    • (2001) Cryptography and Coding , pp. 360-363
    • Cocks, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.