메뉴 건너뛰기




Volumn 8939, Issue , 2015, Pages 566-577

Attribute-based encryption optimized for cloud computing

Author keywords

Access control; Attribute based encryption; Multi authority; Storage in clouds; User revocation

Indexed keywords

ACCESS CONTROL; COMPUTATION THEORY; DIGITAL STORAGE; DISTRIBUTED COMPUTER SYSTEMS;

EID: 84922031792     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-662-46078-8_47     Document Type: Conference Paper
Times cited : (63)

References (15)
  • 3
    • 38049078557 scopus 로고    scopus 로고
    • Multi-authority Attribute Based Encryption
    • In: Vadhan, S.P. (ed.), Springer, Heidelberg
    • Chase, M.: Multi-authority Attribute Based Encryption. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 515-534. Springer, Heidelberg (2007)
    • (2007) TCC 2007. LNCS , vol.4392 , pp. 515-534
    • Chase, M.1
  • 6
    • 79957993008 scopus 로고    scopus 로고
    • Decentralizing attribute-based encryption
    • In: Paterson, K.G. (ed.), Springer, Heidelberg
    • Lewko, A., Waters, B.: Decentralizing attribute-based encryption. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 568-588. Springer, Heidelberg (2011)
    • (2011) EUROCRYPT 2011. LNCS , vol.6632 , pp. 568-588
    • Lewko, A.1    Waters, B.2
  • 7
    • 84922017540 scopus 로고    scopus 로고
    • Broadcast revocation scheme in composite-order bilinear group and its application to attribute-based encryption
    • Li, Q., Xiong, H., Zhang, F.: Broadcast revocation scheme in composite-order bilinear group and its application to attribute-based encryption. International Journal of Security and Networks 8(1), 1-12 (2013)
    • (2013) International Journal of Security and Networks , vol.8 , Issue.1 , pp. 1-12
    • Li, Q.1    Xiong, H.2    Zhang, F.3
  • 11
    • 84865465739 scopus 로고    scopus 로고
    • Dynamic credentials and ciphertext delegation for attribute-based encryption
    • In: Safavi-Naini, R., Canetti, R. (eds.), Springer, Heidelberg
    • Sahai, A., Seyalioglu, H., Waters, B.: Dynamic credentials and ciphertext delegation for attribute-based encryption. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol. 7417, pp. 199-217. Springer, Heidelberg (2012)
    • (2012) CRYPTO 2012. LNCS , vol.7417 , pp. 199-217
    • Sahai, A.1    Seyalioglu, H.2    Waters, B.3
  • 12
    • 24944554962 scopus 로고    scopus 로고
    • Fuzzy identity-based encryption
    • In: Cramer, R. (ed.), Springer, Heidelberg
    • Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457-473. Springer, Heidelberg (2005)
    • (2005) EUROCRYPT 2005. LNCS , vol.3494 , pp. 457-473
    • Sahai, A.1    Waters, B.2
  • 13
    • 79960839401 scopus 로고    scopus 로고
    • Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers
    • Wang, G., Liu, Q., Wu, J., Guo, M.: Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers. Computers & Security 30(5), 320-331 (2011)
    • (2011) Computers & Security , vol.30 , Issue.5 , pp. 320-331
    • Wang, G.1    Liu, Q.2    Wu, J.3    Guo, M.4
  • 14
    • 79952521560 scopus 로고    scopus 로고
    • Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization
    • In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.), Springer, Heidelberg
    • Waters, B.: Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 53-70. Springer, Heidelberg (2011)
    • (2011) PKC 2011. LNCS , vol.6571 , pp. 53-70
    • Waters, B.1
  • 15
    • 84883076035 scopus 로고    scopus 로고
    • DAC-MACS: Effective data access control for multi-authority cloud storage systems
    • Yang, K., Jia, X., Ren, K., Zhang, B.: DAC-MACS: Effective data access control for multi-authority cloud storage systems. In: INFOCOM, 2013 Proceedings IEEE, pp. 2895-2903 (2013)
    • (2013) INFOCOM, 2013 Proceedings IEEE , pp. . 2895-. 2903
    • Yang, K.1    Jia, X.2    Ren, K.3    Zhang, B.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.