메뉴 건너뛰기




Volumn 7618 LNCS, Issue , 2012, Pages 191-201

Outsourcing encryption of attribute-based encryption with MapReduce

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS POLICIES; CLOUD SERVICES; COMPUTATIONAL COSTS; EXPONENTIATIONS; LOCAL COMPUTATION; MAP-REDUCE;

EID: 84868320122     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-34129-8_17     Document Type: Conference Paper
Times cited : (98)

References (28)
  • 6
    • 35048868831 scopus 로고    scopus 로고
    • Server Assisted Signatures Revisited
    • Okamoto, T. (ed.) CT-RSA 2004. Springer, Heidelberg
    • Bicakci, K., Baykal, N.: Server Assisted Signatures Revisited. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol. 2964, pp. 143-156. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.2964 , pp. 143-156
    • Bicakci, K.1    Baykal, N.2
  • 7
    • 84865597567 scopus 로고    scopus 로고
    • New Algorithms for Secure Outsourcing of Modular Exponentiations
    • Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. Springer, Heidelberg
    • Chen, X., Li, J., Ma, J., Tang, Q., Lou, W.: New Algorithms for Secure Outsourcing of Modular Exponentiations. In: Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. LNCS, vol. 7459, pp. 541-556. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7459 , pp. 541-556
    • Chen, X.1    Li, J.2    Ma, J.3    Tang, Q.4    Lou, W.5
  • 9
    • 80051994919 scopus 로고    scopus 로고
    • Memory Delegation
    • Rogaway, P. (ed.) CRYPTO 2011. Springer, Heidelberg
    • Chung, K.M., Kalai, Y., Liu, F.H., Raz, R.: Memory Delegation. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 151-168. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6841 , pp. 151-168
    • Chung, K.M.1    Kalai, Y.2    Liu, F.H.3    Raz, R.4
  • 10
    • 37549003336 scopus 로고    scopus 로고
    • Mapreduce: Simplified data processing on large clusters
    • Dean, J., Ghemawat, S.: Mapreduce: simplified data processing on large clusters. Commun. ACM 51(1), 107-113 (2008)
    • (2008) Commun. ACM , vol.51 , Issue.1 , pp. 107-113
    • Dean, J.1    Ghemawat, S.2
  • 11
    • 84955339164 scopus 로고    scopus 로고
    • Secure Integration of Asymmetric and Symmetric Encryption Schemes
    • Wiener, M. (ed.) CRYPTO 1999. Springer, Heidelberg
    • Fujisaki, E., Okamoto, T.: Secure Integration of Asymmetric and Symmetric Encryption Schemes. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 537-554. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1666 , pp. 537-554
    • Fujisaki, E.1    Okamoto, T.2
  • 12
    • 77957005936 scopus 로고    scopus 로고
    • Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers
    • Rabin, T. (ed.) CRYPTO 2010. Springer, Heidelberg
    • Gennaro, R., Gentry, C., Parno, B.: Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 465-482. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6223 , pp. 465-482
    • Gennaro, R.1    Gentry, C.2    Parno, B.3
  • 14
    • 79957974657 scopus 로고    scopus 로고
    • Implementing Gentry's Fully-Homomorphic Encryption Scheme
    • Paterson, K.G. (ed.) EUROCRYPT 2011. Springer, Heidelberg
    • Gentry, C., Halevi, S.: Implementing Gentry's Fully-Homomorphic Encryption Scheme. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 129-148. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6632 , pp. 129-148
    • Gentry, C.1    Halevi, S.2
  • 18
    • 24144493423 scopus 로고    scopus 로고
    • How to Securely Outsource Cryptographic Computations
    • Kilian, J. (ed.) TCC 2005. Springer, Heidelberg
    • Hohenberger, S., Lysyanskaya, A.: How to Securely Outsource Cryptographic Computations. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 264-282. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3378 , pp. 264-282
    • Hohenberger, S.1    Lysyanskaya, A.2
  • 19
    • 84937432284 scopus 로고    scopus 로고
    • Secure Server-Aided Signature Generation
    • Kim, K.-C. (ed.) PKC 2001. Springer, Heidelberg
    • Jakobsson, M., Wetzel, S.: Secure Server-Aided Signature Generation. In: Kim, K.-C. (ed.) PKC 2001. LNCS, vol. 1992, pp. 383-401. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.1992 , pp. 383-401
    • Jakobsson, M.1    Wetzel, S.2
  • 20
    • 77954635558 scopus 로고    scopus 로고
    • Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
    • Gilbert, H. (ed.) EUROCRYPT 2010. Springer, Heidelberg
    • Lewko, A., Okamoto, T., Sahai, A., Takashima, K., Waters, B.: Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 62-91. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6110 , pp. 62-91
    • Lewko, A.1    Okamoto, T.2    Sahai, A.3    Takashima, K.4    Waters, B.5
  • 21
    • 70350407157 scopus 로고    scopus 로고
    • Privacy-Aware Attribute-Based Encryption with User Accountability
    • Samarati, P., Yung, M., Martinelli, F., Ardagna, C. (eds.) ISC 2009. Springer, Heidelberg
    • Li, J., Ren, K., Zhu, B., Wan, Z.: Privacy-Aware Attribute-Based Encryption with User Accountability. In: Samarati, P., Yung, M., Martinelli, F., Ardagna, C. (eds.) ISC 2009. LNCS, vol. 5735, pp. 347-362. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5735 , pp. 347-362
    • Li, J.1    Ren, K.2    Zhu, B.3    Wan, Z.4
  • 23
    • 0033342534 scopus 로고    scopus 로고
    • Non-malleable non-interactive zero knowledge and adaptive chosen-ciphertext security
    • Sahai, A.: Non-malleable non-interactive zero knowledge and adaptive chosen-ciphertext security. In: 40th Annual Symposium on Foundations of Computer Science, pp. 543-553 (1999)
    • (1999) 40th Annual Symposium on Foundations of Computer Science , pp. 543-553
    • Sahai, A.1
  • 24
    • 84865465739 scopus 로고    scopus 로고
    • Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption
    • Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. Springer, Heidelberg
    • Sahai, A., Seyalioglu, H., Waters, B.: Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol. 7417, pp. 199-217. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7417 , pp. 199-217
    • Sahai, A.1    Seyalioglu, H.2    Waters, B.3
  • 25
    • 24944554962 scopus 로고    scopus 로고
    • Fuzzy Identity-Based Encryption
    • Cramer, R. (ed.) EUROCRYPT 2005. Springer, Heidelberg
    • Sahai, A., Waters, B.: Fuzzy Identity-Based Encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457-473. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3494 , pp. 457-473
    • Sahai, A.1    Waters, B.2
  • 26
    • 70350345210 scopus 로고    scopus 로고
    • Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
    • Halevi, S. (ed.) CRYPTO 2009. Springer, Heidelberg
    • Waters, B.: Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 619-636. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5677 , pp. 619-636
    • Waters, B.1
  • 27
    • 79952521560 scopus 로고    scopus 로고
    • Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization
    • Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. Springer, Heidelberg
    • Waters, B.: Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 53-70. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6571 , pp. 53-70
    • Waters, B.1
  • 28
    • 84862956001 scopus 로고    scopus 로고
    • Efficient and secure data storage operations for mobile cloud computing
    • ePrint Archive, Report 2011/185
    • Zhou, Z., Huang, D.: Efficient and secure data storage operations for mobile cloud computing. Cryptology ePrint Archive, Report 2011/185 (2011)
    • (2011) Cryptology
    • Zhou, Z.1    Huang, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.