메뉴 건너뛰기




Volumn 62, Issue , 2016, Pages 148-160

Enabled/disabled predicate encryption in clouds

Author keywords

Cloud computing; Data self destruction; Predicate encryption; Search; Timed release

Indexed keywords

ACCESS CONTROL; CLOUD COMPUTING; DIGITAL STORAGE;

EID: 84952342355     PISSN: 0167739X     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.future.2015.12.008     Document Type: Article
Times cited : (9)

References (36)
  • 1
    • 58349118819 scopus 로고    scopus 로고
    • Compact proofs of retrievability, in: Proc. ASIACRYPT 2008, 2008, pp. 90–107
    • [1] H. Shacham, B. Waters, Compact proofs of retrievability, in: Proc. ASIACRYPT 2008, 2008, pp. 90–107.
    • Shacham, H.1    Waters, B.2
  • 2
    • 79960900327 scopus 로고    scopus 로고
    • A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability
    • [2] Hao, Z., Zhong, S., Yu, N., A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability. IEEE Trans. Knowl. Data Eng. 23:9 (2011), 1432–1437.
    • (2011) IEEE Trans. Knowl. Data Eng. , vol.23 , Issue.9 , pp. 1432-1437
    • Hao, Z.1    Zhong, S.2    Yu, N.3
  • 11
    • 84867290573 scopus 로고    scopus 로고
    • Privacy-preserving decentralized key-policy attribute-based encryption
    • [11] Han, J., Susilo, W., Mu, Y., Yan, J., Privacy-preserving decentralized key-policy attribute-based encryption. IEEE Trans. Parallel Distrib. Syst. 23:11 (2012), 2150–2162.
    • (2012) IEEE Trans. Parallel Distrib. Syst. , vol.23 , Issue.11 , pp. 2150-2162
    • Han, J.1    Susilo, W.2    Mu, Y.3    Yan, J.4
  • 12
    • 33745218758 scopus 로고    scopus 로고
    • Improved proxy re-encryption schemes with applications to secure distributed storage
    • [12] Ateniese, G., Fu, K., Green, M., Hohenberger, S., Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 9:1 (2006), 1–30.
    • (2006) ACM Trans. Inf. Syst. Secur. , vol.9 , Issue.1 , pp. 1-30
    • Ateniese, G.1    Fu, K.2    Green, M.3    Hohenberger, S.4
  • 13
    • 79951935674 scopus 로고    scopus 로고
    • Unidirectional chosen-ciphertext secure proxy re-encryption
    • [13] Libert, B., Vergnaud, D., Unidirectional chosen-ciphertext secure proxy re-encryption. IEEE Trans. Inform. Theory 57:3 (2011), 1786–1802.
    • (2011) IEEE Trans. Inform. Theory , vol.57 , Issue.3 , pp. 1786-1802
    • Libert, B.1    Vergnaud, D.2
  • 17
    • 78650053109 scopus 로고    scopus 로고
    • Side channels in cloud services: Deduplication in cloud storage
    • [17] Harnik, D., Pinkas, B., Shulman-Peleg, A., Side channels in cloud services: Deduplication in cloud storage. IEEE Secur. Priv. 8:6 (2010), 40–47.
    • (2010) IEEE Secur. Priv. , vol.8 , Issue.6 , pp. 40-47
    • Harnik, D.1    Pinkas, B.2    Shulman-Peleg, A.3
  • 18
    • 0037623983 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • [18] Boneh, D., Franklin, M., Identity-based encryption from the weil pairing. SIAM J. Comput. 32:3 (2003), 586–615.
    • (2003) SIAM J. Comput. , vol.32 , Issue.3 , pp. 586-615
    • Boneh, D.1    Franklin, M.2
  • 22
    • 80051794695 scopus 로고    scopus 로고
    • Efficient hidden vector encryption for conjunctive queries on encrypted data
    • [22] Park, J.H., Efficient hidden vector encryption for conjunctive queries on encrypted data. IEEE Trans. Knowl. Data Eng. 23:10 (2011), 1483–1497.
    • (2011) IEEE Trans. Knowl. Data Eng. , vol.23 , Issue.10 , pp. 1483-1497
    • Park, J.H.1
  • 23
    • 84906514653 scopus 로고    scopus 로고
    • Efficient hidden vector encryption with constant-size ciphertext
    • Springer International Publishing
    • [23] Phuong, T.V.X., Yang, G., Susilo, W., Efficient hidden vector encryption with constant-size ciphertext. Computer Security—ESORICS 2014, 2014, Springer International Publishing, 472–487.
    • (2014) Computer Security—ESORICS 2014 , pp. 472-487
    • Phuong, T.V.X.1    Yang, G.2    Susilo, W.3
  • 25
    • 79952189632 scopus 로고    scopus 로고
    • Inner-product encryption under standard assumptions
    • [25] Park, J.H., Inner-product encryption under standard assumptions. Des. Codes Cryptogr. 58:3 (2011), 235–257.
    • (2011) Des. Codes Cryptogr. , vol.58 , Issue.3 , pp. 235-257
    • Park, J.H.1
  • 34
    • 84860512062 scopus 로고    scopus 로고
    • A secure erasure code-based cloud storage system with secure data forwarding
    • [34] Lin, H.Y., Tzeng, W.G., A secure erasure code-based cloud storage system with secure data forwarding. IEEE Trans. Parallel Distrib. Syst. 23:6 (2012), 995–1003.
    • (2012) IEEE Trans. Parallel Distrib. Syst. , vol.23 , Issue.6 , pp. 995-1003
    • Lin, H.Y.1    Tzeng, W.G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.