|
[1] J. Bethencourt, A. Sahai, and B. Waters, "Ciphertext-policy attribute based encryption," in Security and Privacy, 2007. SP ''07. IEEE Symposium on, 2007, pp. 321–334. [2] M. Li, S. Yu, Y. Zheng, K. Ren, and W. Lou, "Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption," IEEE Transactions on Parallel and Distributed Systems, vol. 24, pp. 131–143, Jan. 2013. [3] V. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attribute-based encryption for fine-grained access control of encrypted data," in Proceedings of the 13th ACM conference on Computer and communications security, 2006, pp. 213–229. [4] S. Yu, C. Wang, and K. Ren, "Achieving secure, scalable, and fine-grained data access control in cloud computing," in Infocom, 2010 proceedings IEEE, 2010, pp. 1–9. [5] D. Boneh and M. Franklin, "Identity-based encryption from the weil pairing," in Advances in Cryptology — CRYPTO 2001, 2001, pp. 213–229. [6] A. Sahai and B. Waters, "Fuzzy identity-based encryption," in Advances in Cryptology — EUROCRYPT 2005, 2005, pp. 457–473. [7] T. Jung, X. Li, and Z. Wan, "Control cloud data access privilege and anonymity with fully anonymous attribute-based encryption," IEEE Transactions on Information Forensics and Security, vol. 10, pp. 190–199, Jan. 2015. [8] S. Ruj, M. Stojmenovic, Milos Stojmenovic, and A. Nayak, "Privacy preserving access control with authentication for securing data in clouds," in Cluster, Cloud and Grid Computing (CCGrid), 2012 12th IEEE/ACM International Symposium on, 2012, pp. 556–563. [9] X. Liang, R. Lu, X. Lin, and X. Shen, "Ciphertext policy attribute based encryption with efficient revocation," Technical Report, University of Waterloo, 2010. [10] M. Blaze, G. Bleumer, and M. Strauss, "Divertible protocols and atomic proxy cryptography," in Advances in Cryptology — EUROCRYPT''98, 1998, pp. 127–144. [11] S. Yu, C. Wang, K. Ren, and W. Lou, "Attribute based data sharing with attribute revocation," in Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, 2010, pp. 261–270. [12] J. Hur and D. Noh, "Attribute-based access control with efficient revocation in data outsourcing systems," IEEE Transactions on Parallel and Distributed Systems, vol. 99, pp. 1214–1221, Nov. 2011. [13] Kallahalla, Mahesh, et al. "Plutus: Scalable Secure File Sharing on Untrusted Storage." in Proc. of FAST’03, 2003. pp. 29–42 [14] A. Beimel, "Secure schemes for secret sharing and key distribution," PhD thesis, Israel Institute of Technology, Technion, Haifa, Israel, 1996. [15] Ciphertext-Policy Attribute-based Encryption Toolkit. [Online]. Available: http://acsc.csl.sri.com/cpabe/, accessed 2016.
|