메뉴 건너뛰기




Volumn 10, Issue 7, 2015, Pages 1384-1393

Attribute-based encryption with efficient verifiable outsourced decryption

Author keywords

Attributed based encryption; data sharing; verifiability

Indexed keywords

MOBILE SECURITY; SECURITY OF DATA;

EID: 84930201567     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2015.2410137     Document Type: Article
Times cited : (178)

References (22)
  • 1
    • 24944554962 scopus 로고    scopus 로고
    • Fuzzy identity-based encryption
    • R. Cramer, Ed. Berlin, Germany: Springer-Verlag
    • A. Sahai and B. Waters, "Fuzzy identity-based encryption," in Advances in Cryptology (Lecture Notes in Computer Science), vol. 3494, R. Cramer, Ed. Berlin, Germany: Springer-Verlag, 2005, pp. 457-473.
    • (2005) Advances in Cryptology (Lecture Notes in Computer Science) , vol.3494 , pp. 457-473
    • Sahai, A.1    Waters, B.2
  • 4
    • 79952521560 scopus 로고    scopus 로고
    • Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization
    • D. Catalano, N. Fazio, R. Gennaro, and A. Nicolosi, Eds. Berlin, Germany: Springer-Verlag
    • B. Waters, "Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization," in Public Key Cryptography (Lecture Notes in Computer Science), vol. 6571, D. Catalano, N. Fazio, R. Gennaro, and A. Nicolosi, Eds. Berlin, Germany: Springer-Verlag, 2011, pp. 53-70.
    • (2011) Public Key Cryptography (Lecture Notes in Computer Science) , vol.6571 , pp. 53-70
    • Waters, B.1
  • 5
    • 84889034631 scopus 로고    scopus 로고
    • Practical constructions and new proof methods for large universe attribute-based encryption
    • Y. Rouselakis and B. Waters, "Practical constructions and new proof methods for large universe attribute-based encryption," in Proc. ACM Conf. Comput. Commun. Secur., 2013, pp. 463-474.
    • (2013) Proc. ACM Conf. Comput. Commun. Secur , pp. 463-474
    • Rouselakis, Y.1    Waters, B.2
  • 9
    • 84880652100 scopus 로고    scopus 로고
    • Attribute-based encryption with verifiable outsourced decryption
    • Aug
    • J. Lai, R. H. Deng, C. Guan, and J. Weng, "Attribute-based encryption with verifiable outsourced decryption," IEEE Trans. Inf. Forensics Security, vol. 8, no. 8, pp. 1343-1354, Aug. 2013.
    • (2013) IEEE Trans. Inf. Forensics Security , vol.8 , Issue.8 , pp. 1343-1354
    • Lai, J.1    Deng, R.H.2    Guan, C.3    Weng, J.4
  • 10
    • 77957005936 scopus 로고    scopus 로고
    • Non-interactive verifiable computing: Outsourcing computation to untrusted workers
    • T. Rabin, Ed. Berlin, Germany: Springer-Verlag
    • R. Gennaro, C. Gentry, and B. Parno, "Non-interactive verifiable computing: Outsourcing computation to untrusted workers," in Advances in Cryptology (Lecture Notes in Computer Science), vol. 6223, T. Rabin, Ed. Berlin, Germany: Springer-Verlag, 2010, pp. 465-482.
    • (2010) Advances in Cryptology (Lecture Notes in Computer Science) , vol.6223 , pp. 465-482
    • Gennaro, R.1    Gentry, C.2    Parno, B.3
  • 11
    • 77957002840 scopus 로고    scopus 로고
    • Improved delegation of computation using fully homomorphic encryption
    • T. Rabin, Ed. Berlin, Germany: Springer-Verlag
    • K.-M. Chung, Y. Kalai, and S. Vadhan, "Improved delegation of computation using fully homomorphic encryption," in Advances in Cryptology (Lecture Notes in Computer Science), vol. 6223, T. Rabin, Ed. Berlin, Germany: Springer-Verlag, 2010, pp. 483-501.
    • (2010) Advances in Cryptology (Lecture Notes in Computer Science) , vol.6223 , pp. 483-501
    • Chung, K.-M.1    Kalai, Y.2    Vadhan, S.3
  • 13
    • 70350642087 scopus 로고    scopus 로고
    • Fully homomorphic encryption using ideal lattices
    • C. Gentry, "Fully homomorphic encryption using ideal lattices," in Proc. STOC, 2009, pp. 169-178.
    • (2009) Proc. STOC , pp. 169-178
    • Gentry, C.1
  • 14
    • 79957974657 scopus 로고    scopus 로고
    • Implementing Gentry's fully-homomorphic encryption scheme
    • K. G. Paterson, Ed. Berlin, Germany: Springer-Verlag
    • C. Gentry and S. Halevi, "Implementing Gentry's fully-homomorphic encryption scheme," in Advances in Cryptology (Lecture Notes in Computer Science), vol. 6632, K. G. Paterson, Ed. Berlin, Germany: Springer-Verlag, 2011, pp. 129-148.
    • (2011) Advances in Cryptology (Lecture Notes in Computer Science) , vol.6632 , pp. 129-148
    • Gentry, C.1    Halevi, S.2
  • 15
    • 0027726717 scopus 로고
    • Random oracles are practical: A paradigm for designing efficient protocols
    • M. Bellare and P. Rogaway, "Random oracles are practical: A paradigm for designing efficient protocols," in Proc. CCS, 1993, pp. 62-73.
    • (1993) Proc. CCS , pp. 62-73
    • Bellare, M.1    Rogaway, P.2
  • 16
    • 84894634556 scopus 로고    scopus 로고
    • Securely outsourcing attribute-based encryption with checkability
    • Aug., [Online]
    • J. Li, X. Huang, J. Li, X. Chen, and Y. Xiang, "Securely outsourcing attribute-based encryption with checkability," IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 4, pp. 2201-2210, Aug. 2014. [Online]. Available: http://ieeexplore.ieee.org/xpls/abs-all.jsp?arnumber=6642027
    • (2014) IEEE Trans. Parallel Distrib. Syst , vol.25 , Issue.4 , pp. 2201-2210
    • Li, J.1    Huang, X.2    Li, J.3    Chen, X.4    Xiang, Y.5
  • 18
    • 52149117439 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data," SIAM J. Comput., vol. 38, no. 1, pp. 97-139, 2008.
    • (2008) SIAM J. Comput , vol.38 , Issue.1 , pp. 97-139
    • Dodis, Y.1    Ostrovsky, R.2    Reyzin, L.3    Smith, A.4
  • 19
    • 33745142417 scopus 로고    scopus 로고
    • Sequences of games: A tool for taming complexity in security proofs
    • New York Univ., New York, NY, USA, Tech. Rep. 2004/332, [Online]
    • V. Shoup, "Sequences of games: A tool for taming complexity in security proofs," Dept. Comput. Sci., New York Univ., New York, NY, USA, Tech. Rep. 2004/332, 2004. [Online]. Available: http://eprint.iacr.org/
    • (2004) Dept. Comput. Sci
    • Shoup, V.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.