|
[1] E. H. Josh Benaloh, Melissa Chase and K. Lauter, ”Patient controlled encryption: Ensuring privacy of electronic medical records,” 2009. [2] M. G. Shivaramakrishnan Narayan and R. Safavi-Naini, ”Privacy preserving ehr system using attribute-based infrastructure,” 2010. [3] A. Sahai and B. Waters, ”Fuzzy identity-based encryption,” ACM, 2005. [4] A. S. Vipul Goyal, Omkant Pandey and B. Waters, ”Attribute-based encryption for finegrained access control of encrypted data,” ACM, 2006. [5] A. S. John Bethencourt and B. Waters, ”Ciphertext-policy attribute-based encryption,” 2007. [6] Z. L. Juanjuan Li and L. Zu, ”Chosen-ciphertext secure multi-use unidirectional attributebased proxy re-encryption,” IEEE, 2014. [7] C. G. Liming Fang, Willy Susilo and J. Wang, ”A secure channel free public key encryption with keyword search scheme without random oracle,” springer, 2009. [8] G. D. C. Dan Boneh, Rafail Ostrovsky and G. Persiano, ”Public key encryption with keyword search,” 2004. [9] C. Gentry and A. Silverberg, ”Hierarchical id-based cryptography,” in Advances in cryptology—ASIACRYPT 2002. Springer, 2002, pp. 548–566. 73 [10] M. Burrows, M. Abadi, and R. M. Needham, ”A logic of authentication,” in Proceedings of the Royal Society of London A: Mathematical, Physical and Engineering Sciences, vol. 426, no. 1871. The Royal Society, 1989, pp. 233–271.
|