메뉴 건너뛰기




Volumn 9, Issue 13, 2016, Pages 2059-2069

Time-bound key-aggregate encryption for cloud storage

Author keywords

Attribute based encryption; Cloud storage; key aggregate; Proxy re encryption; Time bound

Indexed keywords

ACCESS CONTROL; AGGREGATES; COPYRIGHTS; DIGITAL STORAGE; INFORMATION MANAGEMENT;

EID: 84959145270     PISSN: 19390114     EISSN: 19390122     Source Type: Journal    
DOI: 10.1002/sec.1463     Document Type: Article
Times cited : (14)

References (53)
  • 1
    • 84905244958 scopus 로고    scopus 로고
    • Metadata driven efficient key generation and distribution in cloud security
    • Anitha R, Mukherjee S. Metadata driven efficient key generation and distribution in cloud security. Journal of Computer Science 2014; 10: 1929–1938.
    • (2014) Journal of Computer Science , vol.10 , pp. 1929-1938
    • Anitha, R.1    Mukherjee, S.2
  • 2
    • 85043268105 scopus 로고    scopus 로고
    • Certificateless public auditing scheme for cloud-assisted wireless body area networks
    • He D, Zeadally S, Wu L. Certificateless public auditing scheme for cloud-assisted wireless body area networks. IEEE Systems Journal 2015. DOI: 10.1109/JSYST.2015.2428620.
    • (2015) IEEE Systems Journal
    • He, D.1    Zeadally, S.2    Wu, L.3
  • 3
    • 84880127634 scopus 로고    scopus 로고
    • Data integrity proof and secure computation in cloud computing
    • Ponnuramu V, Tamilselvan L. Data integrity proof and secure computation in cloud computing. Journal of Computer Science 2012; 8: 1987–1995.
    • (2012) Journal of Computer Science , vol.8 , pp. 1987-1995
    • Ponnuramu, V.1    Tamilselvan, L.2
  • 4
    • 84928106743 scopus 로고    scopus 로고
    • Mutual verifiable provable data auditing in public cloud storage
    • Ren Y, Shen J, Wang J, Han J, Lee S. Mutual verifiable provable data auditing in public cloud storage. Journal of Internet Technology 2015; 16(2): 317–323.
    • (2015) Journal of Internet Technology , vol.16 , Issue.2 , pp. 317-323
    • Ren, Y.1    Shen, J.2    Wang, J.3    Han, J.4    Lee, S.5
  • 5
    • 80051514746 scopus 로고    scopus 로고
    • Achieving fine-grained access control for secure data sharing on cloud servers
    • Wang G, Liu Q, Wu J. Achieving fine-grained access control for secure data sharing on cloud servers. Concurrency and Computation: Practice and Experience 2011; 23(12): 1443–1464.
    • (2011) Concurrency and Computation: Practice and Experience , vol.23 , Issue.12 , pp. 1443-1464
    • Wang, G.1    Liu, Q.2    Wu, J.3
  • 6
    • 84935442590 scopus 로고    scopus 로고
    • Fault-tolerant verifiable keyword symmetric searchable encryption in hybrid cloud
    • Wang J, Yu X, Zhao M. Fault-tolerant verifiable keyword symmetric searchable encryption in hybrid cloud. International Journal of Network Security 2015; 17(4): 471–483.
    • (2015) International Journal of Network Security , vol.17 , Issue.4 , pp. 471-483
    • Wang, J.1    Yu, X.2    Zhao, M.3
  • 8
    • 84927789109 scopus 로고    scopus 로고
    • A two-factor authentication scheme with anonymity for multi-server environments
    • Chen CT, Lee CC. A two-factor authentication scheme with anonymity for multi-server environments. Security and Communication Networks 2015; 8(8): 1608–1625.
    • (2015) Security and Communication Networks , vol.8 , Issue.8 , pp. 1608-1625
    • Chen, C.T.1    Lee, C.C.2
  • 10
    • 84922001116 scopus 로고    scopus 로고
    • Robust anonymous authentication protocol for healthcare applications using wireless medical sensor networks
    • He D, Kumar N, Chen J, et al. Robust anonymous authentication protocol for healthcare applications using wireless medical sensor networks. Multimedia Systems 2015; 21(1): 49–60.
    • (2015) Multimedia Systems , vol.21 , Issue.1 , pp. 49-60
    • He, D.1    Kumar, N.2    Chen, J.3
  • 11
    • 84935865949 scopus 로고    scopus 로고
    • A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks
    • He D, Kumar N, Chilamkurti N. A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. Information Sciences 2015; 321: 263–277.
    • (2015) Information Sciences , vol.321 , pp. 263-277
    • He, D.1    Kumar, N.2    Chilamkurti, N.3
  • 12
    • 84921481484 scopus 로고    scopus 로고
    • Authentication protocol for ambient assisted living system
    • He D, Zeadally S. Authentication protocol for ambient assisted living system. IEEE Communications Magazine 2015; 35(1): 71–77.
    • (2015) IEEE Communications Magazine , vol.35 , Issue.1 , pp. 71-77
    • He, D.1    Zeadally, S.2
  • 13
    • 84874109689 scopus 로고    scopus 로고
    • Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage
    • Koo DY, Hur JB, Yoon HS. Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage. Computers & Electrical Engineering 2013; 39(1): 34–46.
    • (2013) Computers & Electrical Engineering , vol.39 , Issue.1 , pp. 34-46
    • Koo, D.Y.1    Hur, J.B.2    Yoon, H.S.3
  • 14
    • 84881510395 scopus 로고    scopus 로고
    • A survey on attribute-based encryption schemes of access control in cloud environments
    • Lee CC, Chung PS, Hwang MS. A survey on attribute-based encryption schemes of access control in cloud environments. International Journal of Network Security 2013; 15(4): 231–240.
    • (2013) International Journal of Network Security , vol.15 , Issue.4 , pp. 231-240
    • Lee, C.C.1    Chung, P.S.2    Hwang, M.S.3
  • 15
    • 84870234713 scopus 로고    scopus 로고
    • Cryptanalysis of a secure and efficient authentication protocol for anonymous channel in wireless communications
    • Lee CC, Lin TH, Tsai CS. Cryptanalysis of a secure and efficient authentication protocol for anonymous channel in wireless communications. Securit and Communication Networks 2012; 5(12): 1375–1378.
    • (2012) Securit and Communication Networks , vol.5 , Issue.12 , pp. 1375-1378
    • Lee, C.C.1    Lin, T.H.2    Tsai, C.S.3
  • 16
    • 84928721359 scopus 로고    scopus 로고
    • A Dynamic Identity Based User Authentication Scheme for Remote Login Systems
    • Li CT, Lee CC, Weng CY. A Dynamic Identity Based User Authentication Scheme for Remote Login Systems. Security and Communication Networks, 2015. DOI:10.1002/sec.1264.
    • (2015) Security and Communication Networks
    • Li, C.T.1    Lee, C.C.2    Weng, C.Y.3
  • 18
    • 79960839401 scopus 로고    scopus 로고
    • Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers
    • Wang QJ, Liu Q, Wu J, Guo MY. Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers. Computers & Security 2011; 30(5): 320–331.
    • (2011) Computers & Security , vol.30 , Issue.5 , pp. 320-331
    • Wang, Q.J.1    Liu, Q.2    Wu, J.3    Guo, M.Y.4
  • 19
    • 24944554962 scopus 로고    scopus 로고
    • Fuzzy identity-based encryption
    • Sahai A, Waters B. Fuzzy identity-based encryption. LNCS 2005; 3494: 457–473.
    • (2005) LNCS , vol.3494 , pp. 457-473
    • Sahai, A.1    Waters, B.2
  • 25
    • 0036187601 scopus 로고    scopus 로고
    • A time-bound cryptographic key assignment scheme for access control in a hierarchy
    • Tzeng WG. A time-bound cryptographic key assignment scheme for access control in a hierarchy. IEEE Transactions on Knowledge and Data Engineering 2002; 14(1): 182–188.
    • (2002) IEEE Transactions on Knowledge and Data Engineering , vol.14 , Issue.1 , pp. 182-188
    • Tzeng, W.G.1
  • 26
    • 0041347682 scopus 로고    scopus 로고
    • Security of Tzeng's time-bound key assignment scheme for access control in a hierarchy
    • Yi X, Ye Y. Security of Tzeng's time-bound key assignment scheme for access control in a hierarchy. IEEE Transactions on Knowledge and Data Engineering 2003; 15(4): 1054–1055.
    • (2003) IEEE Transactions on Knowledge and Data Engineering , vol.15 , Issue.4 , pp. 1054-1055
    • Yi, X.1    Ye, Y.2
  • 27
    • 13844281059 scopus 로고    scopus 로고
    • Efficient time-bound hierarchical key assignment scheme
    • Chien HY. Efficient time-bound hierarchical key assignment scheme. IEEE Transactions on Knowledge and Data Engineering 2004; 16(10): 1301–1304.
    • (2004) IEEE Transactions on Knowledge and Data Engineering , vol.16 , Issue.10 , pp. 1301-1304
    • Chien, H.Y.1
  • 28
    • 33947655924 scopus 로고    scopus 로고
    • Security of Chien's efficient time-bound hierarchical key assignment scheme
    • Yi X. Security of Chien's efficient time-bound hierarchical key assignment scheme. IEEE Transactions on Knowledge and Data Engineering 2005; 17(9): 1298–1299.
    • (2005) IEEE Transactions on Knowledge and Data Engineering , vol.17 , Issue.9 , pp. 1298-1299
    • Yi, X.1
  • 33
    • 77953310709 scopus 로고    scopus 로고
    • Achieving secure, scalablefine-grained data access control in cloud computing
    • Yu S, Wang C, Ren K, Lou W. Achieving secure, scalable, and fine-grained data access control in cloud computing. Proc. of the IEEE INFOCOM, 2010; 1–9.
    • (2010) Proc. of the IEEE INFOCOM , pp. 1-9
    • Yu, S.1    Wang, C.2    Ren, K.3    Lou, W.4
  • 36
    • 84858038683 scopus 로고    scopus 로고
    • Secure and privacy preserving keyword searching for cloud storage services
    • Liu Q, Wang G, Wu J. Secure and privacy preserving keyword searching for cloud storage services. Journal of Network and Computer Applications 2012; 35(3): 927–933.
    • (2012) Journal of Network and Computer Applications , vol.35 , Issue.3 , pp. 927-933
    • Liu, Q.1    Wang, G.2    Wu, J.3
  • 37
    • 84893774081 scopus 로고    scopus 로고
    • Controllable privacy preserving search based on symmetric predicate encryption in cloud storage
    • Fan CI, Huang SY. Controllable privacy preserving search based on symmetric predicate encryption in cloud storage. Future Generation Computer Systems 2013; 29(7): 1716–1724.
    • (2013) Future Generation Computer Systems , vol.29 , Issue.7 , pp. 1716-1724
    • Fan, C.I.1    Huang, S.Y.2
  • 38
    • 84885662348 scopus 로고    scopus 로고
    • Data dynamics for remote data possession checking in cloud storage
    • Chen L, Zhou S, Huang X, Xu L. Data dynamics for remote data possession checking in cloud storage. Computers and Electrical Engineering 2013; 29(7):2413–2424.
    • (2013) Computers and Electrical Engineering , vol.29 , Issue.7 , pp. 2413-2424
    • Chen, L.1    Zhou, S.2    Huang, X.3    Xu, L.4
  • 42
    • 84889079354 scopus 로고    scopus 로고
    • Time-based proxy re-encryption scheme for secure data sharing in a cloud environment
    • Liu Q, Wang GJ, Wu J. Time-based proxy re-encryption scheme for secure data sharing in a cloud environment. Information Sciences 2014; 258(24): 355–370.
    • (2014) Information Sciences , vol.258 , Issue.24 , pp. 355-370
    • Liu, Q.1    Wang, G.J.2    Wu, J.3
  • 43
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing
    • Boneh D, Franklin M. Identity-based encryption from the Weil pairing. Lecture Notes in Computer Science 2001; 2139: 213–229.
    • (2001) Lecture Notes in Computer Science , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 44
    • 23944461491 scopus 로고    scopus 로고
    • A one round protocol for tripartite Diffie–Hellman
    • Joux A. A one round protocol for tripartite Diffie–Hellman. Journal of Cryptology 2004; 17(4): 263–276.
    • (2004) Journal of Cryptology , vol.17 , Issue.4 , pp. 263-276
    • Joux, A.1
  • 45
    • 21144454271 scopus 로고    scopus 로고
    • Separating decision Diffie–Hellman from computational Diffie–Hellman in cryptographic groups
    • Joux A, Nguyen K. Separating decision Diffie–Hellman from computational Diffie–Hellman in cryptographic groups. Journal of Cryptology 2003; 16(4): 239–247.
    • (2003) Journal of Cryptology , vol.16 , Issue.4 , pp. 239-247
    • Joux, A.1    Nguyen, K.2
  • 46
    • 84944270475 scopus 로고    scopus 로고
    • A dynamic threshold decryption scheme using bilinear pairings
    • King B. A dynamic threshold decryption scheme using bilinear pairings. International Journal of Network Security 2015; 17(6): 771–778.
    • (2015) International Journal of Network Security , vol.17 , Issue.6 , pp. 771-778
    • King, B.1
  • 47
    • 80054087969 scopus 로고    scopus 로고
    • Group oriented identity-based deniable authentication protocol from the bilinear pairings
    • Lu R, Cao Z. Group oriented identity-based deniable authentication protocol from the bilinear pairings. International Journal of Network Security 2007; 5(3): 283–287.
    • (2007) International Journal of Network Security , vol.5 , Issue.3 , pp. 283-287
    • Lu, R.1    Cao, Z.2
  • 48
    • 80054058425 scopus 로고    scopus 로고
    • ID-based weak blind signature from bilinear pairings
    • Zhao ZM. ID-based weak blind signature from bilinear pairings. International Journal of Network Security 2008; 7(2): 265–268.
    • (2008) International Journal of Network Security , vol.7 , Issue.2 , pp. 265-268
    • Zhao, Z.M.1
  • 49
    • 33745166648 scopus 로고    scopus 로고
    • Collusion resistant broadcast encryption with short ciphertexts and private keys
    • Boneh D, Gentry C, Waters B. Collusion resistant broadcast encryption with short ciphertexts and private keys. Lecture Notes in Computer Science 2005; 3621: 258–275.
    • (2005) Lecture Notes in Computer Science , vol.3621 , pp. 258-275
    • Boneh, D.1    Gentry, C.2    Waters, B.3
  • 51
    • 84925535323 scopus 로고    scopus 로고
    • A new three-party authenticated key agreement scheme based on chaotic maps without password table
    • Lee CC, Li CT, Chiu ST, Lai YM. A new three-party authenticated key agreement scheme based on chaotic maps without password table. Nonlinear Dynamics 2015; 79(4): 2485–2495.
    • (2015) Nonlinear Dynamics , vol.79 , Issue.4 , pp. 2485-2495
    • Lee, C.C.1    Li, C.T.2    Chiu, S.T.3    Lai, Y.M.4
  • 52
    • 84899085643 scopus 로고    scopus 로고
    • An extended chaotic-maps-based protocol with key agreement for multi-server environments
    • Lee CC, Lou DC, Li CT, Hsu CW. An extended chaotic-maps-based protocol with key agreement for multi-server environments. Nonlinear Dynamics 2014; 76(1): 853–866.
    • (2014) Nonlinear Dynamics , vol.76 , Issue.1 , pp. 853-866
    • Lee, C.C.1    Lou, D.C.2    Li, C.T.3    Hsu, C.W.4
  • 53
    • 84892610583 scopus 로고    scopus 로고
    • Application of BAN-logic., CMG Public Sector B.V
    • 19 April
    • Wessels J. Application of BAN-logic. Technical Report, CMG Public Sector B.V., 19 April 2001.
    • (2001) Technical Report
    • Wessels, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.