0% found this document useful (0 votes)
12 views2 pages

Attribute-Based Encryption References

This document lists references related to security challenges and encryption techniques in cloud computing. It includes various studies on attribute-based encryption, fuzzy identity-based encryption, and verifiable outsourced decryption. The references span multiple years and conferences, highlighting advancements in cryptographic methods for secure access control.

Uploaded by

zay sev
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views2 pages

Attribute-Based Encryption References

This document lists references related to security challenges and encryption techniques in cloud computing. It includes various studies on attribute-based encryption, fuzzy identity-based encryption, and verifiable outsourced decryption. The references span multiple years and conferences, highlighting advancements in cryptographic methods for secure access control.

Uploaded by

zay sev
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

CHAPTER-10

REFERENCE
[1] K. Ren, C. Wang, and Q. Wang, “Security challenges for the public cloud,” IEEE Internet
Computing, vol. 16, no. 1, pp. 69–73, 2012.

[2] A. Sahai and B. Waters, “Fuzzy identity-based encryption,” in International Conference


on Theory and Applications of Cryptographic Techniques, 2005, pp. 457–473.

[3] J. Lai, R. H. Deng, C. Guan, and J. Weng, “Attribute-based encryption with verifiable
outsourced decryption,” IEEE Transactions on information forensics and security, vol. 8, no.
8, pp. 1343–1354, 2013.

[4] H. Ma, R. Zhang, Z. Wan, Y. Lu, and S. Lin, “Verifiable and exculpable outsourced
attribute-based encryption for access control in cloud computing,” IEEE transactions on
dependable and secure computing, vol. 14, no. 6, pp. 679–692, 2015.

[5] J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-policy attributebased encryption,” in


IEEE Symposium on Security and Privacy, 2007, pp. 321–334.

[6] V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption for fine-
grained access control of encrypted data,” in ACM Conference on Computer and
Communications Security, 2006, pp. 89–98.

[7] K. Emura, A. Miyaji, A. Nomura, K. Omote, and M. Soshi, “A ciphertext-policy


attribute-based encryption scheme with constant ciphertext length,” in International
Conference on Information Security Practice and Experience. Springer, 2009, pp. 13–23.

[8] S. Hohenberger and B. Waters, “Attribute-based encryption with fast decryption,” in


International Workshop on Public Key Cryptography. Springer, 2013, pp. 162–179.

9] N. Attrapadung, B. Libert, and E. De Panafieu, “Expressive key-policy attribute-based


encryption with constant-size ciphertexts,” in International Workshop on Public Key
Cryptography. Springer, 2011, pp.90–108
[10] J. Herranz, F. Laguillaumie, and C. Rafols, “Constant size ciphertexts ` in threshold
attribute-based encryption,” in International Workshop on Public Key Cryptography.
Springer, 2010, pp. 19–34.

You might also like