Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing
From MaRDI portal
Publication:1703692
DOI10.1007/s00500-016-2271-2zbMath1381.94089OpenAlexW2464557694WikidataQ122482416 ScholiaQ122482416MaRDI QIDQ1703692
Debiao He, Chuan Zhao, Zhihua Zheng, Hao Wang, Jian Shen, Ming-Hao Zhao
Publication date: 7 March 2018
Published in: Soft Computing (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00500-016-2271-2
Related Items (7)
Verifiable fully outsourced attribute-based signcryption system for IoT eHealth big data in cloud computing ⋮ Fuzzy matching: multi-authority attribute searchable encryption without central authority ⋮ Incentive compatible and anti-compounding of wealth in proof-of-stake ⋮ Efficient and secure outsourced approximate pattern matching protocol ⋮ Expressive attribute-based keyword search with constant-size ciphertext ⋮ An alternative approach to public cloud data auditing supporting data dynamics ⋮ Improvement of an outsourced attribute-based encryption scheme
Cites Work
- Efficient algorithms for secure outsourcing of bilinear pairings
- New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques
- Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption
- Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
- Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization
- Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
- New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
- Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
- Fuzzy Identity-Based Encryption
- Theory of Cryptography
This page was built for publication: Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing