1. Hur J. Improving security and efficiency in attribute-based data sharing. IEEE Transactions on Knowledge and Data Engineering, 2013, 25(10): 2271-2282
2. Cecile D. Identity-based broadcast encryption with constant size ciphertexts and private keys. Advances in Cryptology:Proceedings of the 13th International Conference on the Theory and Application of Cryptology and Information Security(ASIACRYPT’07), Dec 2-6, 2007, Kuching, Malaysia.LNCS 4833.Berlin,Germany: Springer-Verlag, 2007: 193-215
3. Zhou Z, Huang D. On efficient ciphertext-policy attribute based encryption and broadcast encryption.Proceedings of the 17th ACM Conference on Computer and Communications Security(CCCS’10), Oct 4-8, 2010, Chicago, IL, USA. New York, NY,USA:ACM, 2010: 753-755
4. Goyal V, Pandey O, Sahai A, et al. Attribute-based encryption for fine-grained access control of encrypted data. Proceedings of the 13th ACM Conference on Computer and Communications Security (CCCS’06), Oct 30-Nov 3, Alexandria, VA, USA. New York, NY, USA: ACM, 2006: 89-98
5. Hur J, Koo D, Hwang S O, et al. Removing escrow from ciphertext policy attribute-based encryption. Computers and Mathematics with Applications, 2013, 65(9): 1310-1317
6. Liang X, Li X, Lu R, et al. An efficient and secure user revocation scheme in mobile social networks. Proceedings of the IEEE Global Communications Conference (GLOBECOM’11), Dec 5-9, 2011, Houston, TX, USA. Piscataway, NJ, USA: IEEE, 2011: 5p
7. Li M, Yu S, Zheng Y. Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Transactions on Parallel and Distributed Systems, 2013, 24(1): 131-143
8. Hur J, Noh D K. Attribute-based access control with efficient revocation in data outsourcing systems. IEEE Transactions on Parallel and Distributed Systems, 2011, 22(7): 1214-1221
9. Hur J. Attribute-based secure data sharing with hidden policies in smart grid. IEEE Transactions on Parallel and Distributed Systems, 2013, 24(11): 2171-2180
10. Lubicz D, Sirvent T. Attribute-based broadcast encryption scheme made efficient. Advances in Cryptology: Proceedings of the 1st International Conference on Cryptology in Africa (AFRICACRYPT’08), Jun 11-14, 2008
11. Casablanca, Morocco. LNCS 5023. Berlin, Germany: Springer-Verlag, 2008: 325-342
12. Junod P, Karlov A. An efficient public-key attribute-based broadcast encryption scheme allowing arbitrary access policies. Proceedings of the 17th ACM Conference on Computer and Communications Security (CCCS’10), Oct 4-8, 2010, Chicago, IL, USA. New York, NY, USA: ACM, 2010: 13-24
13. Asim M, Ibraimi L, Petkovic M. Ciphertext-policy attribute-based broadcast encryption scheme. Communications and Multimedia Security: Proceedings of the 12th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS’11), Oct 19-21, 2011, Ghent, Belgium. LNCS 7025. Berlin, Germany: Springer-Verlag, 2011: 244-246
14. Yang K, Jia X, Ren K, et al. DAC-MACS: Effective data access control for multi-authority cloud storage systems. Proceedings of the 32nd IEEE Conference on Computer Communications (INFOCOM’13), Apr 14-19, 2013, Turin, Italy. Piscataway, NJ, USA: IEEE, 2013: 2895-2903
15. Dong X, Yua J, Luo Y, et al. Achieving an effective, scalable and privacy-preserving data sharing service in cloud computing. Computers and Security, 2014, 42:151-162
|