Cost-Effective and Scalable Data Sharing in Cloud Storage Using Hierarchical Attribute-Based Encryption with Forward Security
From MaRDI portal
Publication:4639922
DOI10.1142/S0129054117500289zbMath1387.68106OpenAlexW2788049089WikidataQ57607305 ScholiaQ57607305MaRDI QIDQ4639922
Wenfen Liu, Jianghong Wei, Xuexian Hu, Xin-Yi Huang
Publication date: 14 May 2018
Published in: International Journal of Foundations of Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1142/s0129054117500289
Data encryption (aspects in computer science) (68P25) Information storage and retrieval of data (68P20)
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Forward-secure identity-based signature: security notions and construction
- Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts
- Identity-based signature scheme based on quadratic residues
- Forward-secure multisignature and blind signature schemes
- Attribute-Based Encryption for Circuits from Multilinear Maps
- New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques
- Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption
- Improved Dual System ABE in Prime-Order Groups via Predicate Encodings
- Identity-Based Cryptosystems and Signature Schemes
- Decentralizing Attribute-Based Encryption
- Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization
- Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
- Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
- Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption
- Forward-Secure Hierarchical Predicate Encryption
- Strongly secure identity-based authenticated key agreement protocols in the escrow mode
- Efficient Identity-Based Encryption Without Random Oracles
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- Fuzzy Identity-Based Encryption
- Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys
- Forward-Secure and Searchable Broadcast Encryption with Short Ciphertexts and Private Keys
This page was built for publication: Cost-Effective and Scalable Data Sharing in Cloud Storage Using Hierarchical Attribute-Based Encryption with Forward Security