참고문헌
- A. Beimel, Secure schemes for secret sharing and key distribution, Ph. D. thesis, Dept. of Computer Science, Technion, 1996
- J. Bethencourt, A. Sahai, and B. Waters, Ciphertext-policy attribute-based encryption, IEEE Symposium on Security and Privacy, 321–334, 2007 https://doi.org/10.1109/SP.2007.11
- D. Boneh, A brief look at pairings based cryptography, FOCS, 19–26, IEEE Computer Society, 2007 https://doi.org/10.1109/FOCS.2007.5
- D. Boneh and X. Boyen, Short signatures without random oracles and the SDH assumption in bilinear groups, J. Cryptology 21 (2008), no. 2, 149–177 https://doi.org/10.1007/s00145-007-9005-7
- M. Chase, Multi-authority attribute based encryption, Theory of cryptography, 515–534, Lecture Notes in Comput. Sci., 4392, Springer, Berlin, 2007 https://doi.org/10.1007/978-3-540-70936-7_28
- L. Cheung and C. C. Newport, Provably secure ciphertext policy ABE, ACM Conference on Computer and Communications Security (Peng Ning, Sabrina De Capitani di Vimercati, and Paul F. Syverson, eds.), 456–465, ACM, 2007 https://doi.org/10.1145/1315245.1315302
- S. D. Galbraith, K. G. Paterson, and N. P. Smart, Pairings for cryptographers, Discrete Appl. Math. 156 (2008), no. 16, 3113–3121 https://doi.org/10.1016/j.dam.2007.12.010
- V. Goyal, A. Jain, O. Pandey, and A. Sahai, Bounded ciphertext policy attribute based encryption, ICALP, 2008
- V. Goyal, O. Pandey, A. Sahai, and B. Waters, Attribute-based encryption for finegrained access control of encrypted data, ACM Conference on Computer and Communications Security (Ari Juels, Rebecca N. Wright, and Sabrina De Capitani di Vimercati, eds.), 89–98, ACM, 2006 https://doi.org/10.1145/1180405.1180418
- S. Muller, S. Katzenbeisser, and C. Eckert, Distributed attribute-based encryption, 11th International Conference on Information Security and Cryptology, 2008, to appear https://doi.org/10.1007/978-3-642-00730-9_2
- A. Sahai and B. Waters, Fuzzy identity-based encryption, Advances in cryptology-EUROCRYPT 2005, 457–473, Lecture Notes in Comput. Sci., 3494, Springer, Berlin, 2005 https://doi.org/10.1007/11426639_27
- V. Shoup, Lower bounds for discrete logarithms and related problems, Advances in cryptology-EUROCRYPT '97 (Konstanz), 256–266, Lecture Notes in Comput. Sci., 1233, Springer, Berlin, 1997 https://doi.org/10.1007/3-540-69053-0_18
- D. R. Stinson, An explication of secret sharing schemes, Des. Codes Cryptography 2 (1992), no. 4, 357–390 https://doi.org/10.1007/BF00125203
- B. Waters, Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization, Tech. report, SRI International, 2008, work in progress
피인용 문헌
- SDSS-MAC: Secure data sharing scheme in multi-authority cloud storage systems vol.62, 2016, https://doi.org/10.1016/j.cose.2016.07.007
- A Survey of Research Progress and Development Tendency of Attribute-Based Encryption vol.2014, 2014, https://doi.org/10.1155/2014/193426
- Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption vol.23, pp.11, 2012, https://doi.org/10.1109/TPDS.2012.50
- Provably secure unbounded multi-authority ciphertext-policy attribute-based encryption vol.8, pp.18, 2015, https://doi.org/10.1002/sec.1326
- Fully secure ciphertext policy attribute-based encryption with constant length ciphertext and faster decryption vol.7, pp.11, 2014, https://doi.org/10.1002/sec.913
- A novel approach for privacy homomorphism using attribute-based encryption vol.9, pp.17, 2016, https://doi.org/10.1002/sec.1620
- Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption vol.10, pp.1, 2015, https://doi.org/10.1109/TIFS.2014.2368352
- Large universe decentralized key-policy attribute-based encryption vol.8, pp.3, 2015, https://doi.org/10.1002/sec.997
- Multi-authority attribute-based encryption scheme with constant-size ciphertexts and user revocation pp.15320626, 2019, https://doi.org/10.1002/cpe.4678
- Light weight and fine-grained access mechanism for secure access to outsourced data* pp.15320626, 2018, https://doi.org/10.1002/cpe.4736
- A Novel Authorization Scheme for Multimedia Social Networks Under Cloud Storage Method by Using MA-CP-ABE vol.8, pp.3, 2018, https://doi.org/10.4018/IJCAC.2018070103