메뉴 건너뛰기




Volumn 10, Issue 10, 2015, Pages 2119-2130

Revisiting Attribute-Based Encryption with Verifiable Outsourced Decryption

Author keywords

access control; Attribute based encryption; outsourced decryption; verifiability

Indexed keywords

ACCESS CONTROL; ALUMINUM; BANDWIDTH; COST REDUCTION; COSTS; DIGITAL STORAGE; MESH GENERATION; PUBLIC KEY CRYPTOGRAPHY;

EID: 84939231120     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2015.2449264     Document Type: Article
Times cited : (143)

References (30)
  • 1
    • 24944554962 scopus 로고    scopus 로고
    • Fuzzy identity-based encryption
    • A. Sahai and B. Waters, "Fuzzy identity-based encryption, " in Proc. EUROCRYPT, 2005, pp. 457-473.
    • (2005) Proc. EUROCRYPT , pp. 457-473
    • Sahai, A.1    Waters, B.2
  • 3
    • 84880652100 scopus 로고    scopus 로고
    • Attribute-based encryption with verifiable outsourced decryption
    • Aug.
    • J. Lai, R. H. Deng, C. Guan, and J. Weng, "Attribute-based encryption with verifiable outsourced decryption, " IEEE Trans. Inf. Forensics Security, vol. 8, no. 8, pp. 1343-1354, Aug. 2013.
    • (2013) IEEE Trans. Inf. Forensics Security , vol.8 , Issue.8 , pp. 1343-1354
    • Lai, J.1    Deng, R.H.2    Guan, C.3    Weng, J.4
  • 6
    • 79952521560 scopus 로고    scopus 로고
    • Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization
    • B. Waters, "Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization, " in Proc. Public Key Cryptography, 2011, pp. 53-70.
    • (2011) Proc. Public Key Cryptography , pp. 53-70
    • Waters, B.1
  • 7
    • 77954635558 scopus 로고    scopus 로고
    • Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption
    • A. Lewko, T. Okamoto, A. Sahai, K. Takashima, and B. Waters, "Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption, " in Proc. EUROCRYPT, 2010, pp. 62-91.
    • (2011) Proc. EUROCRYPT , pp. 62-91
    • Lewko, A.1    Okamoto, T.2    Sahai, A.3    Takashima, K.4    Waters, B.5
  • 8
    • 34547273527 scopus 로고    scopus 로고
    • Attribute-based encryption for fine-grained access control of encrypted data
    • V. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attribute-based encryption for fine-grained access control of encrypted data, " in Proc. ACM Conf. Comput. Commun. Secur., 2006, pp. 89-98.
    • (2006) Proc ACM Conf. Comput. Commun. Secur , pp. 89-98
    • Goyal, V.1    Pandey, O.2    Sahai, A.3    Waters, B.4
  • 13
  • 15
    • 38149085581 scopus 로고    scopus 로고
    • Efficient delegation of pairing computation
    • B. G. Kang, M. S. Lee, and J. H. Park, "Efficient delegation of pairing computation, " Cryptol. ePrint Arch., Rep. 2005/259, 2005. [Online]. Available: http://eprint.iacr.org/
    • (2005) Cryptol. EPrint Arch., Rep , vol.259 , pp. 2005
    • Kang, B.G.1    Lee, M.S.2    Park, J.H.3
  • 17
    • 84957718934 scopus 로고    scopus 로고
    • Divertible protocols and atomic proxy cryptography
    • M. Blaze, G. Bleumer, and M. Strauss, "Divertible protocols and atomic proxy cryptography, " in Proc. EUROCRYPT, 1998, pp. 127-144.
    • (1998) Proc. EUROCRYPT , pp. 127-144
    • Blaze, M.1    Bleumer, G.2    Strauss, M.3
  • 18
    • 33745218758 scopus 로고    scopus 로고
    • Improved proxy re-encryption schemes with applications to secure distributed storage
    • Feb
    • G. Ateniese, K. Fu, M. Green, and S. Hohenberger, "Improved proxy re-encryption schemes with applications to secure distributed storage, " ACM Trans. Inf. Syst. Secur., vol. 9, no. 1, pp. 1-30, Feb. 2006.
    • (2006) ACM Trans. Inf. Syst. Secur , vol.9 , Issue.1 , pp. 1-30
    • Ateniese, G.1    Fu, K.2    Green, M.3    Hohenberger, S.4
  • 19
    • 77957005936 scopus 로고    scopus 로고
    • Non-interactive verifiable computing: Outsourcing computation to untrusted workers
    • R. Gennaro, C. Gentry, and B. Parno, "Non-interactive verifiable computing: Outsourcing computation to untrusted workers, " in Proc. CRYPTO, 2010, pp. 465-482.
    • (2011) Proc. CRYPTO , pp. 465-482
    • Gennaro, R.1    Gentry, C.2    Parno, B.3
  • 20
    • 77957002840 scopus 로고    scopus 로고
    • Improved delegation of computation using fully homomorphic encryption
    • K.-M. Chung, Y. Kalai, and S. Vadhan, "Improved delegation of computation using fully homomorphic encryption, " in Proc. CRYPTO, 2010, pp. 483-501.
    • (2011) Proc. CRYPTO , pp. 483-501
    • Chung, K.-M.1    Kalai, Y.2    Vadhan, S.3
  • 22
    • 84894634556 scopus 로고    scopus 로고
    • Securely outsourcing attribute-based encryption with checkability
    • Aug.
    • J. Li, X. Huang, J. Li, X. Chen, and Y. Xiang, "Securely outsourcing attribute-based encryption with checkability, " IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 8, pp. 2201-2210, Aug. 2013.
    • (2013) IEEE Trans. Parallel Distrib. Syst , vol.25 , Issue.8 , pp. 2201-2210
    • Li, J.1    Huang, X.2    Li, J.3    Chen, X.4    Xiang, Y.5
  • 24
    • 85122602758 scopus 로고    scopus 로고
    • Chapman & Hall/CRC Cryptography and Network Security Series). London, U.K.: Chapman & Hall
    • J. Katz and Y. Lindell, Introduction to Modern Cryptography (Chapman & Hall/CRC Cryptography and Network Security Series). London, U.K.: Chapman & Hall, 2007.
    • (2007) Introduction to Modern Cryptography
    • Katz, J.1    Lindell, Y.2
  • 25
    • 77957013995 scopus 로고    scopus 로고
    • Cryptographic extraction and key derivation: The HKDF scheme
    • H. Krawczyk, "Cryptographic extraction and key derivation: The HKDF scheme, " in Proc. CRYPTO, 2010, pp. 631-648.
    • (2011) Proc. CRYPTO , pp. 631-648
    • Krawczyk, H.1
  • 27
    • 0000845043 scopus 로고
    • Non-interactive and information-theoretic secure verifiable secret sharing
    • T. P. Pedersen, "Non-interactive and information-theoretic secure verifiable secret sharing, " in Proc. CRYPTO, 1991, pp. 129-140.
    • (1991) Proc. CRYPTO , pp. 129-140
    • Pedersen, T.P.1
  • 28
    • 84881234170 scopus 로고    scopus 로고
    • Charm: A framework for rapidly prototyping cryptosystems
    • J. A. Akinyele et al., "Charm: A framework for rapidly prototyping cryptosystems, " J. Cryptograph. Eng., vol. 3, no. 2, pp. 111-128, 2013.
    • (2013) J. Cryptograph. Eng , vol.3 , Issue.2 , pp. 111-128
    • Akinyele, J.A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.