메뉴 건너뛰기




Volumn 78, Issue , 2018, Pages 730-738

CCA-secure ABE with outsourced decryption for fog computing

Author keywords

Attribute based encryption; Chosen ciphertext security; Fog computing; IoT; Outsourced decryption

Indexed keywords

CLOUD COMPUTING; FOG; INTERNET OF THINGS; NETWORK FUNCTION VIRTUALIZATION; SECURITY OF DATA;

EID: 85029576091     PISSN: 0167739X     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.future.2016.10.028     Document Type: Article
Times cited : (133)

References (36)
  • 1
    • 84905024335 scopus 로고    scopus 로고
    • Toward efficient and privacy-preserving computing in big data era
    • Lu, Rongxing, Zhu, Hui, Liu, Ximeng, Liu, Joseph K., Shao, Jun, Toward efficient and privacy-preserving computing in big data era. IEEE Netw. 28:4 (2014), 46–50.
    • (2014) IEEE Netw. , vol.28 , Issue.4 , pp. 46-50
    • Lu, R.1    Zhu, H.2    Liu, X.3    Liu, J.K.4    Shao, J.5
  • 2
    • 84938848384 scopus 로고    scopus 로고
    • Coalition games for spatio-temporal big data in Internet of vehicles environment: a comparative analysis
    • Kumar, Neeraj, Misra, Sudip, Rodrigues, Joel J.P.C., Obaidat, Mohammad S., Coalition games for spatio-temporal big data in Internet of vehicles environment: a comparative analysis. IEEE Internet Things J. 2:4 (2015), 310–320.
    • (2015) IEEE Internet Things J. , vol.2 , Issue.4 , pp. 310-320
    • Kumar, N.1    Misra, S.2    Rodrigues, J.J.P.C.3    Obaidat, M.S.4
  • 3
    • 84961786656 scopus 로고    scopus 로고
    • Toward secure large-scale machine-to-machine communications in 3gpp networks: challenges and solutions
    • Lai, Chengzhe, Lu, Rongxing, Zheng, Dong, Li, Hui, Shen, Xuemin (sherman), Toward secure large-scale machine-to-machine communications in 3gpp networks: challenges and solutions. IEEE Commun. Mag. 53:12 (2015), 12–19.
    • (2015) IEEE Commun. Mag. , vol.53 , Issue.12 , pp. 12-19
    • Lai, C.1    Lu, R.2    Zheng, D.3    Li, H.4    Shen, X.S.5
  • 4
    • 85029604834 scopus 로고    scopus 로고
    • Cisco delivers vision of fog computing to accelerate value from billions of connected devices. Technical Report
    • The Network, Cisco delivers vision of fog computing to accelerate value from billions of connected devices. Technical Report., 2014.
    • (2014)
    • The Network1
  • 5
    • 24944554962 scopus 로고    scopus 로고
    • Fuzzy identity-based encryption
    • Sahai, Amit, Waters, Brent, Fuzzy identity-based encryption. EUROCRYPT 2005 LNCS, vol. 3494, 2005, 457–473.
    • (2005) EUROCRYPT 2005, LNCS , vol.3494 , pp. 457-473
    • Sahai, A.1    Waters, B.2
  • 6
    • 34547273527 scopus 로고    scopus 로고
    • Attribute-based encryption for fine-grained access control of encrypted data
    • Ari Juels Rebecca N. Wright Sabrina De Capitani di Vimercati ACM
    • Goyal, Vipul, Pandey, Omkant, Sahai, Amit, Waters, Brent, Attribute-based encryption for fine-grained access control of encrypted data. Juels, Ari, Wright, Rebecca N., di Vimercati, Sabrina De Capitani, (eds.) ACM Conference on Computer and Communications Security, 2006, ACM, 89–98.
    • (2006) ACM Conference on Computer and Communications Security , pp. 89-98
    • Goyal, V.1    Pandey, O.2    Sahai, A.3    Waters, B.4
  • 7
    • 34548731375 scopus 로고    scopus 로고
    • Ciphertext-policy attribute-based encryption
    • John Bethencourt, Amit Sahai, Brent Waters, Ciphertext-policy attribute-based encryption, in: IEEE S&P 2007, 2007, pp. 321–334.
    • (2007) in: IEEE S&P 2007 , pp. 321-334
    • Bethencourt, J.1    Sahai, A.2    Waters, B.3
  • 8
    • 45749116552 scopus 로고    scopus 로고
    • Provably secure ciphertext policy abe
    • Ling Cheung, Calvin Newport, Provably secure ciphertext policy abe, in: ACM CCS 2007, 2007, pp. 456–465.
    • (2007) in: ACM CCS 2007 , pp. 456-465
    • Cheung, L.1    Newport, C.2
  • 9
    • 77954635558 scopus 로고    scopus 로고
    • Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption
    • Lewko, Allison, Okamoto, Tatsuaki, Sahai, Amit, Takashima, Katsuyuki, Waters, Brent, Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption. EUROCRYPT LNCS, vol. 6110, 2010, 62–91.
    • (2010) EUROCRYPT, LNCS , vol.6110 , pp. 62-91
    • Lewko, A.1    Okamoto, T.2    Sahai, A.3    Takashima, K.4    Waters, B.5
  • 10
    • 77957011503 scopus 로고    scopus 로고
    • Fully secure functional encryption with general relations from the decisional linear assumption
    • Tatsuaki Okamoto, Katsuyuki Takashima, Fully secure functional encryption with general relations from the decisional linear assumption. CRYPTO LNCS, vol. 6223, 2010, 191–208.
    • (2010) CRYPTO, LNCS , vol.6223 , pp. 191-208
    • Tatsuaki Okamoto, K.T.1
  • 11
    • 84883113038 scopus 로고    scopus 로고
    • Energy provisioning in wireless rechargeable sensor networks
    • He, Shibo, Chen, Jiming, Jiang, Fachang, Yau, David K.Y., Xing, Guoliang, Sun, Youxian, Energy provisioning in wireless rechargeable sensor networks. IEEE Trans. Mob. Comput. 12:10 (2013), 1931–1942.
    • (2013) IEEE Trans. Mob. Comput. , vol.12 , Issue.10 , pp. 1931-1942
    • He, S.1    Chen, J.2    Jiang, F.3    Yau, D.K.Y.4    Xing, G.5    Sun, Y.6
  • 12
    • 85029586197 scopus 로고    scopus 로고
    • IDC: Top 10 technology predictions for 2015. Technical report.
    • Gil Press, IDC: Top 10 technology predictions for 2015. Technical report. http://www.forbes.com/sites/gilpress/2014/12/02/idc-top-10-technology-predictions-for-2015/#17112a59650e.
    • Press, G.1
  • 14
    • 35048852705 scopus 로고    scopus 로고
    • Chosen-ciphertext security from identity-based encryption
    • Christian Cachin Jan Camenisch Springer
    • Canetti, Ran, Halevi, Shai, Katz, Jonathan, Chosen-ciphertext security from identity-based encryption. Cachin, Christian, Camenisch, Jan, (eds.) EUROCRYPT Lecture Notes in Computer Science, vol. 3027, 2004, Springer, 207–222.
    • (2004) EUROCRYPT, Lecture Notes in Computer Science , vol.3027 , pp. 207-222
    • Canetti, R.1    Halevi, S.2    Katz, J.3
  • 15
    • 84955339164 scopus 로고    scopus 로고
    • Secure integration of asymmetric and symmetric encryption schemes
    • Fujisaki, Eiichiro, Okamoto, Tatsuaki, Secure integration of asymmetric and symmetric encryption schemes. CRYPTO 1999 LNCS, vol. 1666, 1999, 537–554.
    • (1999) CRYPTO 1999, LNCS , vol.1666 , pp. 537-554
    • Fujisaki, E.1    Okamoto, T.2
  • 16
    • 34547273527 scopus 로고    scopus 로고
    • Attribute-based encryption for fine grained access control of encrypted data
    • Vipul Goyal, Omkant Pandey, Amit Sahai, Brent Waters, Attribute-based encryption for fine grained access control of encrypted data, in: ACM CCS 2006, 2006, pp. 89–98.
    • (2006) in: ACM CCS 2006 , pp. 89-98
    • Goyal, V.1    Pandey, O.2    Sahai, A.3    Waters, B.4
  • 17
    • 74049120601 scopus 로고    scopus 로고
    • Attribute-based encryption with non-monotonic access structures
    • Rafail Ostrovsky, Amit Sahai, Brent Waters, Attribute-based encryption with non-monotonic access structures, in: ACM CCS 2007, 2007, pp. 195–203.
    • (2007) in: ACM CCS 2007 , pp. 195-203
    • Ostrovsky, R.1    Sahai, A.2    Waters, B.3
  • 18
    • 70350345210 scopus 로고    scopus 로고
    • Dual system encryption: Realizing fully secure ibe and hibe under simple assumptions
    • Waters, Brent, Dual system encryption: Realizing fully secure ibe and hibe under simple assumptions. EUROCRYPT LNCS, vol. 5677, 2009, 619–636.
    • (2009) EUROCRYPT, LNCS , vol.5677 , pp. 619-636
    • Waters, B.1
  • 19
    • 79952521560 scopus 로고    scopus 로고
    • Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization
    • Waters, Brent, Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization. PKC LNCS, vol. 6571, 2011, 53–70.
    • (2011) PKC, LNCS , vol.6571 , pp. 53-70
    • Waters, B.1
  • 20
    • 84871604439 scopus 로고    scopus 로고
    • Fully secure unbounded inner-product and attribute-based encryption
    • Tatsuaki Okamoto, Katsuyuki Takashima, Fully secure unbounded inner-product and attribute-based encryption. ASIACRYPT LNCS, vol. 7658, 2012, 349–366.
    • (2012) ASIACRYPT, LNCS , vol.7658 , pp. 349-366
    • Tatsuaki Okamoto, K.T.1
  • 21
    • 24944554962 scopus 로고    scopus 로고
    • Fuzzy identity-based encryption
    • Ronald Cramer Springer
    • Sahai, Amit, Waters, Brent, Fuzzy identity-based encryption. Cramer, Ronald, (eds.) EUROCRYPT Lecture Notes in Computer Science, vol. 3494, 2005, Springer, 457–473.
    • (2005) EUROCRYPT, Lecture Notes in Computer Science , vol.3494 , pp. 457-473
    • Sahai, A.1    Waters, B.2
  • 23
  • 24
    • 84880652100 scopus 로고    scopus 로고
    • Attribute-based encryption with verifiable outsourced decryption
    • Junzuo Lai, Chaowen Guan, Deng, Robert H., Weng, Jian, Attribute-based encryption with verifiable outsourced decryption. IEEE Trans. Inf. Forensics Secur. 8:8 (2013), 1343–1354.
    • (2013) IEEE Trans. Inf. Forensics Secur. , vol.8 , Issue.8 , pp. 1343-1354
    • Junzuo Lai, C.G.1    Deng, R.H.2    Weng, J.3
  • 25
    • 84894634556 scopus 로고    scopus 로고
    • Securely outsourcing attribute-based encryption with checkability
    • Li, Jin, Huang, Xinyi, Li, Jingwei, Chen, Xiaofeng, Xiang, Yang, Securely outsourcing attribute-based encryption with checkability. IEEE Trans. Parallel Distrib. Syst. 25:8 (2014), 2201–2210.
    • (2014) IEEE Trans. Parallel Distrib. Syst. , vol.25 , Issue.8 , pp. 2201-2210
    • Li, J.1    Huang, X.2    Li, J.3    Chen, X.4    Xiang, Y.5
  • 26
    • 84939231120 scopus 로고    scopus 로고
    • Revisiting attribute-based encryption with verifiable outsourced decryption
    • Lin, Suqing, Zhang, Rui, Ma, Hui, Wang, Mingsheng, Revisiting attribute-based encryption with verifiable outsourced decryption. IEEE Trans. Inf. Forensics Secur. 10:10 (2015), 2119–2130.
    • (2015) IEEE Trans. Inf. Forensics Secur. , vol.10 , Issue.10 , pp. 2119-2130
    • Lin, S.1    Zhang, R.2    Ma, H.3    Wang, M.4
  • 27
    • 84930201567 scopus 로고    scopus 로고
    • Attribute-based encryption with efficient verifiable outsourced decryption
    • Qin, Baodong, Deng, Robert H., Liu, Shengli, Ma, Siqi, Attribute-based encryption with efficient verifiable outsourced decryption. IEEE Trans. Inf. Forensics Secur. 10:7 (2015), 1384–1393.
    • (2015) IEEE Trans. Inf. Forensics Secur. , vol.10 , Issue.7 , pp. 1384-1393
    • Qin, B.1    Deng, R.H.2    Liu, S.3    Ma, S.4
  • 28
    • 84985919305 scopus 로고    scopus 로고
    • Generic and efficient constructions of attribute-based encryption with verifiable outsourced decryption
    • Mao, Xianping, Lai, Junzuo, Mei, Qixiang, Chen, Kefei, Weng, Jian, Generic and efficient constructions of attribute-based encryption with verifiable outsourced decryption. IEEE Trans. Dependable Secure Comput. 13:5 (2015), 533–546.
    • (2015) IEEE Trans. Dependable Secure Comput. , vol.13 , Issue.5 , pp. 533-546
    • Mao, X.1    Lai, J.2    Mei, Q.3    Chen, K.4    Weng, J.5
  • 29
    • 84957718934 scopus 로고    scopus 로고
    • Divertible protocols and atomic proxy cryptography
    • Blaze, Matt, Bleumer, Gerrit, Strauss, Martin, Divertible protocols and atomic proxy cryptography. EUROCRYPT LNCS, vol. 1403, 1998, 127–144.
    • (1998) EUROCRYPT, LNCS , vol.1403 , pp. 127-144
    • Blaze, M.1    Bleumer, G.2    Strauss, M.3
  • 30
    • 85029604742 scopus 로고    scopus 로고
    • Cloud storage forensics. ISBN.
    • Darren Quick, Ben Martini, Raymond Choo, Cloud storage forensics. ISBN: 978-0-12-419970-5. http://www.sciencedirect.com/science/book/9780124199705.
    • Quick, D.1    Martini, B.2    Choo, R.3
  • 32
    • 84992603948 scopus 로고    scopus 로고
    • Big forensic data management in heterogeneous distributed systems: quick analysis of multimedia forensic data
    • Quick, Darren, Raymond Choo, Kim-Kwang, Big forensic data management in heterogeneous distributed systems: quick analysis of multimedia forensic data. Softw. - Pract. Exp., 2016.
    • (2016) Softw. - Pract. Exp.
    • Quick, D.1    Raymond Choo, K.-K.2
  • 33
    • 85018167456 scopus 로고    scopus 로고
    • Forensic investigation of p2p cloud storage services and backbone for iot networks: Bittorrent sync as a case study
    • Teing, Yee-Yang, Dehghantanha, Ali, Raymond Choo, Kim-Kwang, Yang, Laurence T., Forensic investigation of p2p cloud storage services and backbone for iot networks: Bittorrent sync as a case study. Comput. Electr. Eng., 2016.
    • (2016) Comput. Electr. Eng.
    • Teing, Y.-Y.1    Dehghantanha, A.2    Raymond Choo, K.-K.3    Yang, L.T.4
  • 34
    • 84963728330 scopus 로고    scopus 로고
    • Forensic-by-design framework for cyber-physical cloud systems
    • Ab Rahman, Nurul Hidayah, Glisson, William Bradley, Yang, Yanjiang, Raymond Choo, Kim-Kwang, Forensic-by-design framework for cyber-physical cloud systems. IEEE Cloud Comput. 3:1 (2016), 50–59.
    • (2016) IEEE Cloud Comput. , vol.3 , Issue.1 , pp. 50-59
    • Ab Rahman, N.H.1    Glisson, W.B.2    Yang, Y.3    Raymond Choo, K.-K.4
  • 36
    • 85029598066 scopus 로고    scopus 로고
    • The pairing-based cryptography library
    • Ben Lynn, The pairing-based cryptography library. 2012.
    • (2012)
    • Lynn, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.