Securely Outsourcing Attribute-Based Encryption with Checkability

IEEE Transactions on Parallel and Distributed Systems - Tập 25 Số 8 - Trang 2201-2210 - 2014
Jin Li1, Xinyi Huang2, Jingwei Li3, Xiaofeng Chen4, Yang Xiang5
1School of Computer Science, Guangzhou University, China
2School of Mathematics and Computer Science, Fujian Normal University, China
3College of Information Technical Science, Nankai University, China#TAB#
4State Key Laboratory of Integrated Service Networks (ISN), Xidian University, Xi’an, China#TAB#
5School of Information Technology, Deakin University, Australia

Tóm tắt

Từ khóa


Tài liệu tham khảo

10.1145/2046707.2046759

chen, 2012, New Algorithms for Secure Outsourcing of Modular Exponentiations, Proc ESORICS, lncs 7459, 541

10.1007/978-3-642-32284-6_3

10.1145/258533.258644

10.1016/j.future.2013.09.013

10.1109/TPDS.2012.320

10.1109/INFCOM.2010.5462174

10.1016/S0065-2458(01)80019-X

10.1007/s10207-005-0070-3

10.1109/PST.2008.12

atallah, 2010, Securely Outsourcing Linear Algebra Computations, Proc 5th ACM Symp ASIACCS, 48

10.1109/INFCOM.2011.5935305

bicakci, 2004, Server Assisted Signatures Revisited, Proc Topics Cryptology CT-RSA, lncs 2964, 1991

jakobsson, 2001, Secure Server-Aided Signature Generation, Proc Public Key Cryptography, 383, 10.1007/3-540-44586-2_28

zhou, 2011, Efficient and Secure Data Storage Operations for Mobile Cloud Computing, Cryptology ePrint Archive

10.1109/TIFS.2013.2271848

li, 2013, Fine-Grained Access Control System Based on Outsourced Attribute-Based Encryption, Proc ESORICS'10, 592

green, 2011, Outsourcing the Decryption of ABE Ciphertexts, Proc 20th USENIX Conf SEC, 34

10.1145/1180405.1180418

golle, 2001, Uncheatable Distributed Computations, Proc RSA Conf Topics Cryptol, 425

canetti, 2003, Relaxing Chosen-Ciphertext Security, Advances in Cryptography - Proceedings of Crypto, lncs 2729, 565

cheung, 2007, Provably Secure Ciphertext Policy ABE, Proc 10th ACM Conf CCS, 456

10.1109/SP.2007.11

10.1109/TPDS.2013.221

sahai, 2005, Fuzzy Identity-Based Encryption, Advances in Cryptology Proc Of EUROCRYPT, lncs 3494, 457

10.1007/978-3-540-68914-0_7

hohenberger, 2005, How to Securely Outsource Cryptographic Computations, Theory and Cryptography, lncs 3378, 264, 10.1007/978-3-540-30576-7_15

10.1145/1536414.1536440

10.1145/1374376.1374396

chung, 2011, Memory Delegation, Advances in Cryptography - Proceedings of Crypto, lncs 6841, 151

gennaro, 2010, Non-Interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers, Advances in Cryptography - Proceedings of Crypto, lncs 6223, 465

li, 2012, Outsourcing Encryption of Attribute-Based Encryption with Mapreduce, Proc Int Conf Inf Commun Security, 191, 10.1007/978-3-642-34129-8_17

gentry, 2011, Implementing Gentry's Fully-Homomorphic Encryption Scheme, Advances in Cryptology Proc Of EUROCRYPT, lncs 6632, 129