메뉴 건너뛰기




Volumn 5, Issue 4, 2017, Pages 617-627

Attribute-based access control with constant-size ciphertext in cloud computing

Author keywords

Access control; Cipertext policy attribute based encryption; Constant ciphertext length

Indexed keywords

CLOUD COMPUTING; DIGITAL STORAGE; PUBLIC KEY CRYPTOGRAPHY; RISK PERCEPTION;

EID: 84992121665     PISSN: None     EISSN: 21687161     Source Type: Journal    
DOI: 10.1109/TCC.2015.2440247     Document Type: Article
Times cited : (63)

References (37)
  • 1
    • 85053113096 scopus 로고    scopus 로고
    • Amazon Elastic Compute Cloud (Amazon EC2) [Online]. Available: http://aws.amazon.com/ec2/, 2006.
    • (2006)
  • 2
    • 85053127481 scopus 로고    scopus 로고
    • Amazon Web Service (AWS) [Online]. Available: http://s3. amazonaws.com/, 2006.
    • (2006)
  • 3
    • 85053105131 scopus 로고    scopus 로고
    • Google App Engine (GAE) [Online]. Available: http://code. google.com/appengine/, 2008.
    • (2008)
  • 4
    • 85053125414 scopus 로고    scopus 로고
    • Microsoft Azure [Online]. Available: http://www.windowsazure. com, 2008.
    • (2008)
  • 5
    • 0015331056 scopus 로고
    • On the implementation of security measures in formation systems
    • Apr.
    • R. W. Conway, W. L. MaxWell, and H. L. Morgan, "On the implementation of security measures in formation systems," Commun. ACM, vol. 15, no. 4, pp. 211-220, Apr. 1972.
    • (1972) Commun. ACM , vol.15 , Issue.4 , pp. 211-220
    • Conway, R.W.1    MaxWell, W.L.2    Morgan, H.L.3
  • 6
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • May
    • D. E. Denning, "A lattice model of secure information flow," Commun. ACM, vol. 19, no. 5, pp. 236-243, May 1976.
    • (1976) Commun. ACM , vol.19 , Issue.5 , pp. 236-243
    • Denning, D.E.1
  • 9
    • 0030086382 scopus 로고    scopus 로고
    • Role-based access control models
    • Feb.
    • R. Sandhu, E. J. Coyne, and H. L. Feinstein, "Role-based access control models," IEEE Comput., vol. 29, no. 2, pp. 38-47, Feb. 1996.
    • (1996) IEEE Comput. , vol.29 , Issue.2 , pp. 38-47
    • Sandhu, R.1    Coyne, E.J.2    Feinstein, H.L.3
  • 10
    • 0001827537 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • A. Shamir, "Identity-based cryptosystems and signature schemes," in Proc. Adv. Cryptol.: Conf., 1984, pp. 47-53.
    • (1984) Proc. Adv. Cryptol.: Conf. , pp. 47-53
    • Shamir, A.1
  • 13
    • 77958151362 scopus 로고    scopus 로고
    • Multi-use and unidirectional identity-based proxy re-encryption schemes
    • H. Wang, Z. Cao, and L. Wang, "Multi-use and unidirectional identity-based proxy re-encryption schemes," Inf. Sci., vol. 180, no. 20, pp. 4042-4059, 2010.
    • (2010) Inf. Sci. , vol.180 , Issue.20 , pp. 4042-4059
    • Wang, H.1    Cao, Z.2    Wang, L.3
  • 14
    • 84861582429 scopus 로고    scopus 로고
    • Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption
    • J. Shao and Z. Cao, "Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption," Inf. Sci., vol. 206, pp. 83-95, 2012.
    • (2012) Inf. Sci. , vol.206 , pp. 83-95
    • Shao, J.1    Cao, Z.2
  • 15
    • 78449305489 scopus 로고    scopus 로고
    • Forwardsecure identity-based signature: Security notions and construction
    • J. Yu, R. Hao, F. Kong, X. Cheng, J. Fan, and Y. Chen, "Forwardsecure identity-based signature: Security notions and construction," Inf. Sci., vol. 181, no. 3, pp. 648-660, 2011.
    • (2011) Inf. Sci. , vol.181 , Issue.3 , pp. 648-660
    • Yu, J.1    Hao, R.2    Kong, F.3    Cheng, X.4    Fan, J.5    Chen, Y.6
  • 16
    • 34347393777 scopus 로고    scopus 로고
    • Identity-based key agreement protocols from pairings
    • Jul.
    • L. Chen, Z. Cheng, and N. P. Smart, "Identity-based key agreement protocols from pairings," Int. J. Inf. Security, vol. 6, no. 4, pp. 213-241, Jul. 2007.
    • (2007) Int. J. Inf. Security , vol.6 , Issue.4 , pp. 213-241
    • Chen, L.1    Cheng, Z.2    Smart, N.P.3
  • 17
    • 79960186888 scopus 로고    scopus 로고
    • Provably secure one-round identity-based authenticated asymmetric group key agreement protocol
    • L. Zhang, Q. Wu, B. Qin, and J. Domingo-Ferrer, "Provably secure one-round identity-based authenticated asymmetric group key agreement protocol," Inf. Sci., vol. 181, no. 19, pp. 4318-4329, 2011.
    • (2011) Inf. Sci. , vol.181 , Issue.19 , pp. 4318-4329
    • Zhang, L.1    Wu, Q.2    Qin, B.3    Domingo-Ferrer, J.4
  • 18
    • 79953290413 scopus 로고    scopus 로고
    • Key updating technique in identitybased encryption
    • S. Liu, Y. Long, and K. Chen, "Key updating technique in identitybased encryption," Inf. Sci., vol. 181, no. 11, pp. 2436-2440, 2011.
    • (2011) Inf. Sci. , vol.181 , Issue.11 , pp. 2436-2440
    • Liu, S.1    Long, Y.2    Chen, K.3
  • 20
    • 24944554962 scopus 로고    scopus 로고
    • Fuzzy identity-based encryption
    • May
    • A. Sahai and B. Waters, "Fuzzy identity-based encryption," in Proc. Adv. Cryptol., May 2005, pp. 457-473.
    • (2005) Proc. Adv. Cryptol. , pp. 457-473
    • Sahai, A.1    Waters, B.2
  • 21
    • 34547273527 scopus 로고    scopus 로고
    • Attributebasedencryption for fine-grained access control of encrypted data
    • Oct./Nov.
    • V. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attributebasedencryption for fine-grained access control of encrypted data," in Proc. ACM Conf. Comput. Commun. Security, Oct./Nov. 2006, pp. 89-98.
    • (2006) Proc. ACM Conf. Comput. Commun. Security , pp. 89-98
    • Goyal, V.1    Pandey, O.2    Sahai, A.3    Waters, B.4
  • 26
    • 38049078557 scopus 로고    scopus 로고
    • Multi-authority attribute based encryption
    • M. Chase, "Multi-authority attribute based encryption," in Proc. 4th Conf. Theory Cryptography, 2007, pp. 515-534.
    • (2007) Proc. 4th Conf. Theory Cryptography , pp. 515-534
    • Chase, M.1
  • 27
    • 77953310709 scopus 로고    scopus 로고
    • Achieving secure, scalable, and fine-grained data access control in cloud computing
    • S. Yu, C. Wang, K. Ren, and W. Lou, "Achieving secure, scalable, and fine-grained data access control in cloud computing," in Proc. IEEE INFOCOM, 2010, pp. 1-9.
    • (2010) Proc. IEEE INFOCOM , pp. 1-9
    • Yu, S.1    Wang, C.2    Ren, K.3    Lou, W.4
  • 29
    • 79960839401 scopus 로고    scopus 로고
    • Hierarchical attributebased encryption and scalable user revocation for sharing data in cloud servers
    • G. Wanga, Q. Liu, J. Wu, and M. Guo, "Hierarchical attributebased encryption and scalable user revocation for sharing data in cloud servers," Comput. Security, vol. 30, pp. 320-331, 2011.
    • (2011) Comput. Security , vol.30 , pp. 320-331
    • Wanga, G.1    Liu, Q.2    Wu, J.3    Guo, M.4
  • 30
    • 84863392301 scopus 로고    scopus 로고
    • HASBE: A hierarchical attributebased solution for flexible and scalable access control in cloud computing
    • Apr.
    • Z. Wan, J. Liu, and R. H. Deng, "HASBE: A hierarchical attributebased solution for flexible and scalable access control in cloud computing," IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 743-754, Apr. 2012.
    • (2012) IEEE Trans. Inf. Forensics Security , vol.7 , Issue.2 , pp. 743-754
    • Wan, Z.1    Liu, J.2    Deng, R.H.3
  • 32
    • 84900818518 scopus 로고    scopus 로고
    • Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts
    • H. Deng, Q. Wu, B. Qin, J. Domingo-Ferrer d, and L. Zhang, "Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts," Inf. Sci., vol. 275, pp. 370-384, 2014.
    • (2014) Inf. Sci. , vol.275 , pp. 370-384
    • Deng, H.1    Wu, Q.2    Qin, B.3    Domingo-Ferrerd, J.4    Zhang, L.5
  • 35
    • 24944562007 scopus 로고    scopus 로고
    • Hierarchical identity based encryption with constant size ciphertext
    • D. Boneh, X. Boyen, and E.-J. Goh, "Hierarchical identity based encryption with constant size ciphertext," in Proc. Adv. Cryptol., 2005, pp. 440-456.
    • (2005) Proc. Adv. Cryptol. , pp. 440-456
    • Boneh, D.1    Boyen, X.2    Goh, E.-J.3
  • 36
    • 85053143192 scopus 로고    scopus 로고
    • The Pairing-Based Cryptography Library [Online]. Available: http://crypto.stanford.edu/pbc/, 2006.
    • (2006)
  • 37
    • 85053167955 scopus 로고    scopus 로고
    • The GNU Multiple Precision Arithmetic Library [Online]. Available: http://gmplib.org/, 2002.
    • (2002)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.