CHAPTER-10
REFERENCE
[1] K. Ren, C. Wang, and Q. Wang, “Security challenges for the public cloud,” IEEE Internet
Computing, vol. 16, no. 1, pp. 69–73, 2012.
[2] A. Sahai and B. Waters, “Fuzzy identity-based encryption,” in International Conference
on Theory and Applications of Cryptographic Techniques, 2005, pp. 457–473.
[3] J. Lai, R. H. Deng, C. Guan, and J. Weng, “Attribute-based encryption with verifiable
outsourced decryption,” IEEE Transactions on information forensics and security, vol. 8, no.
8, pp. 1343–1354, 2013.
[4] H. Ma, R. Zhang, Z. Wan, Y. Lu, and S. Lin, “Verifiable and exculpable outsourced
attribute-based encryption for access control in cloud computing,” IEEE transactions on
dependable and secure computing, vol. 14, no. 6, pp. 679–692, 2015.
[5] J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-policy attributebased encryption,” in
IEEE Symposium on Security and Privacy, 2007, pp. 321–334.
[6] V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption for fine-
grained access control of encrypted data,” in ACM Conference on Computer and
Communications Security, 2006, pp. 89–98.
[7] K. Emura, A. Miyaji, A. Nomura, K. Omote, and M. Soshi, “A ciphertext-policy
attribute-based encryption scheme with constant ciphertext length,” in International
Conference on Information Security Practice and Experience. Springer, 2009, pp. 13–23.
[8] S. Hohenberger and B. Waters, “Attribute-based encryption with fast decryption,” in
International Workshop on Public Key Cryptography. Springer, 2013, pp. 162–179.
9] N. Attrapadung, B. Libert, and E. De Panafieu, “Expressive key-policy attribute-based
encryption with constant-size ciphertexts,” in International Workshop on Public Key
Cryptography. Springer, 2011, pp.90–108
[10] J. Herranz, F. Laguillaumie, and C. Rafols, “Constant size ciphertexts ` in threshold
attribute-based encryption,” in International Workshop on Public Key Cryptography.
Springer, 2010, pp. 19–34.