Acknowledgement
Grant : 퍼블릭 클라우드의 안전한 이용을 위한 능동적 보안통제시스템 개발
Supported by : 한국연구재단, 정보통신기술진흥센터
References
- Shamir, A., Identity-based cryptosystems and signature schemes, Proc. CRYPTO, pp. 47-53, 1984.
- Sahai, A. & Waters, B., Fuzzy identity-based encryption, Advances in Cryptology-EUROCRYPT, pp. 457-473, 2005.
- Bobba, R., Khurana, H., AlTurki, M. & Ashraf, F. PBES: A policy based encryption system with application to data sharing in the power grid, Proc. of the 4-th international symposium on information, computer, and communications security, pp. 262-275, 2009.
- Waters, B., Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization, Public Key Cryptography-PKC, pp. 53-70, 2011.
- Alshehri, S., Radziszowski, S. P. & Raj, R. K., Secure access for healthcare data in the cloud using ciphertext-policy attribute-based encryption, Data Engineering Workshops (ICDEW), IEEE 28th International Conference on, pp. 143-146, 2012.
- Hur, J. Attribute-based secure data sharing with hidden policies in smart grid. Parallel and Distributed Systems, IEEE Transactions on, Vol. 24, No. 10, pp. 2171-2180, 2013. https://doi.org/10.1109/TPDS.2012.61
- Guo, L., Zhang, C., Sun, J. & Fang, Y., PAAS: A privacy-preserving attribute-based authentication system for ehealth networks, Distributed Computing Systems (ICDCS), IEEE 32nd International Conference on, pp. 224-233, 2012.
- Kapadia, A., Tsang, P. P. & Smith, S. W., Attribute-based publishing with hidden credentials and hidden policies, NDSS, pp. 179-192, 2007.
- Zhou, Z., Huang, D. & Wang, Z. Efficient privacypreserving ciphertext-policy attribute based-encryption and broadcast encryption. Computers, IEEE Transactions on, Vol. 64, No. 1, pp. 126-138, 2015.
- Zhou, Z. & Huang, D. On efficient ciphertext-policy attribute based encryption and broadcast encryption, Proc. of the 17th ACM conference on Computer and communications security, pp. 753-755, 2010.
- Bethencourt, J., Sahai, A. & Waters, B., Ciphertextpolicy attribute-based encryption, IEEE Symposium on Security and Privacy, pp. 321-334, 2007.
- Goyal, V., Jain, A., Pandey, O. & Sahai, A., Bounded ciphertext policy attribute based encryption, Automata, languages and programming, pp. 579-591, 2008.
- Ibraimi, L., Petkovic, M., Nikova, S., Hartel, P. & Jonker, W., Mediated ciphertext-policy attributebased encryption and its application, Information security applications, pp. 309-323, 2009.
- Jung, T., Li, Y., Wan, Z. & Wan, M., Privacy preserving cloud data access with multi-authorities, INFOCOM, 2013 Proceedings IEEE, pp. 2625-2633, 2013.
- Bradshaw, R. W., Holt, J. E. & Seamons, K. E., Concealing complex policies with hidden credentials, Proc. of the 11th ACM conference on Computer and communications security, pp. 146-157, 2004.
- Li, J., Ren, K., Zhu, B. & Wan, Z., Privacy-aware attribute-based encryption with user accountability, Information Security, Springer Berlin Heidelberg, pp. 347-362, 2009.
- Green, M,. Hohenberger, S., & Waters, B., Outsourcing the Decryption of ABE Ciphertexts, USENIX Security Symposium, 2011.
- Lai, J., Deng, R. H., Guan, C., & Weng, J. Attributebased encryption with verifiable outsourced decryption. Information Forensics and Security, IEEE Transactions on, Vol. 8, No. 8, pp. 1343-1354, 2013. https://doi.org/10.1109/TIFS.2013.2271848
- Lin, S., Zhang, R., Ma, H., & Wang, M. Revisiting Attribute-Based Encryption With Verifiable Outsourced Decryption. Information Forensics and Security, IEEE Transactions on, Vol. 10, No. 10, pp. 2119-2130, 2015. https://doi.org/10.1109/TIFS.2015.2449264
- Jahid, S., Mittal, P., & Borisov, N., EASiER: Encryption-based access control in social networks with efficient revocation, Proc. of the 6-th ACM Symposium on Information, Computer and Communications Security, pp. 411-415, 2011.
- De Caro, A. & Iovino, V., jPBC: Java pairing based cryptography, Computers and Communications (ISCC), IEEE Symposium on, pp. 850-855, 2011.