|
[1] M. Asim, M. Petkovic, and T. Ignatenko. “Attribute-based Encryption with encryption and decryption outsourcing,” 12th Australian Information Security Management Conference (Perth, Australia, December 1-3, 2014), ECU Security Research Institute, pp. 1-28, 2014.
[2] J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-policy attribute-based encryption,” 2007 IEEE Symposium on Security and Privacy (SP'07), IEEE Press, pp. 321-334, 2007.
[3] V. Goyal, O. Pandey, A. Sahai, and B. Waters. “Attribute-based encryption for fine-grained access control of encrypted data,” In Proc. the 13th ACM conference on Computer and communications security, ACM, pp. 89-98, 2006.
[4] M. Green, S. Hohenberger, and B. Waters. “Outsourcing the decryption of ABE ciphertexts,” in Proc. the 20th USENIX conference on Security, pp. 34-34, 2011.
[5] X. Ma, J. Li, and F. Zhang, “Efficient and secure batch exponentiations outsourcing in cloud computing,” 2012 4th International Conference on Intelligent Networking and Collaborative Systems (INCoS), IEEE Press, pp. 600-605, 2012.
[6] L. Touati, Y. Challal, and A. Bouabdallah, “C-CP-ABE: Cooperative ciphertext policy attribute-based encryption for the Internet of Things,” 2014 International Conference on Advanced Networking Distributed Systems and Applications (INDS), IEEE Press, pp. 1-6, 2014.
[7] J. Wang, “Java Realization for Ciphertext-Policy Attribute-Based Encryption,” https://github.com/junwei-wang/cpabe/, 2012.
[8] B. Waters, “Ciphertext-policy attribute-Based encryption: An expressive, efficient, and provably secure realization,” Public Key Cryptography, vol. 6571, pp. 53-70, 2011.
|