Secure and efficient revocable key-aggregate cryptosystem for multiple non-predefined non-disjoint aggregate sets
Tài liệu tham khảo
Sundararajan, 2011, A survey on security issues in service delivery models of cloud computing, J Netw Comput Appl, 34, 1, 10.1016/j.jnca.2010.07.006
Mendez, 2017
Goh EJ, Shacham H, Modadugu N, Boneh D. Sirius: Securing remote untrusted storage. In: NDSS, vol. 3. 2003. p. 131–45.
Chu, 2013, Key-aggregate cryptosystem for scalable data sharing in cloud storage, IEEE Trans Parallel Distrib Syst, 25, 468
Patranabis, 2015, Dynamic key-aggregate cryptosystem on elliptic curves for online data sharing, 25
Benaloh, 2009, Patient controlled encryption: ensuring privacy of electronic medical records, 103
Liu, 2018, Verifiable searchable encryption with aggregate keys for data sharing system, Future Gener Comput Syst, 78, 778, 10.1016/j.future.2017.02.024
Fan, 2018, Transformation between attribute-based encryption and key-aggregate cryptosystem, 35
Guo, 2018, Key-aggregate authentication cryptosystem for data sharing in dynamic cloud storage, Future Gener Comput Syst, 84, 190, 10.1016/j.future.2017.07.038
Atallah, 2009, Dynamic and efficient key management for access hierarchies, ACM Trans Inf Syst Secur, 12, 18, 10.1145/1455526.1455531
Castiglione, 2016, Cryptographic hierarchical access control for dynamic structures, IEEE Trans Inf Forensics Secur, 11, 2349, 10.1109/TIFS.2016.2581147
Park, 2015, New constructions of revocable identity-based encryption from multilinear maps, IEEE Trans Inf Forensics Secur, 10, 1564, 10.1109/TIFS.2015.2419180
Gan, 2017, Revocable key-aggregate cryptosystem for data sharing in cloud, Secur Commun Netw, 2017, 10.1155/2017/2508693
Shi, 2015, Directly revocable key-policy attribute-based encryption with verifiable ciphertext delegation, Inform Sci, 295, 221, 10.1016/j.ins.2014.10.020
Derler, 2018, Revisiting proxy re-encryption: forward secrecy, improved security, and applications, 219
Park, 2012, Key management for multiple multicast groups in wireless networks, IEEE Trans Mob Comput, 12, 1712, 10.1109/TMC.2012.135
Patranabis, 2016, Provably secure key-aggregate cryptosystems with broadcast aggregate keys for online data sharing on the cloud, IEEE Trans Comput, 66, 891, 10.1109/TC.2016.2629510
Cui, 2015, Key-aggregate searchable encryption (kase) for group data sharing via cloud storage, IEEE Trans Comput, 65, 2374, 10.1109/TC.2015.2389959
Padhya, 2019, BTG-RKASE: privacy preserving revocable key aggregate searchable encryption with fine-grained multi-delegation & break-the-glass access control, 109
Chen, 2018, Efficient key-aggregate proxy re-encryption for secure data sharing in clouds, 1
Lee, 2016, Time-bound key-aggregate encryption for cloud storage, Secur Commun Netw, 9, 2059, 10.1002/sec.1463
Patranabis, 2016, Identity-based key aggregate cryptosystem from multilinear maps, IACR Cryptol ePrint Arch, 2016, 693
Boneh, 2005, Collusion resistant broadcast encryption with short ciphertexts and private keys, 258
Alimohammadi, 2019, A secure key-aggregate authentication cryptosystem for data sharing in dynamic cloud storage, Multimedia Tools Appl, 2019, 1
Boneh, 2001, Identity-based encryption from the weil pairing, 213
Oliveira, 2007, Tinytate: Computing the tate pairing in resource-constrained sensor nodes, 318
Akl, 1983, Cryptographic solution to a problem of access control in a hierarchy, ACM Trans Comput Syst, 1, 239, 10.1145/357369.357372
Sandhu, 1988, Cryptographic implementation of a tree hierarchy for access control, Inform Process Lett, 27, 95, 10.1016/0020-0190(88)90099-3
Harn, 1990, A cryptographic key generation scheme for multilevel data security, Comput Secur, 9, 539, 10.1016/0167-4048(90)90132-D
Chen, 2013, Cloudhka: A cryptographic approach for hierarchical access control in cloud computing, 37
Chen, 2017, Hierarchical key assignment with dynamic read-write privilege enforcement and extended ki-security, 165
Coron, 2013, Practical multilinear maps over the integers, 476