1 |
J. Lai, R. H. Deng, Y. Li, and J. Weng, "Fully secure key-policy attributebased encryption with constant-size ciphertexts and fast decryption," In Proceedings of the 9th ACM symposium on Information, computer and communications security, pp. 239-248, 2014.
|
2 |
M. H. Ameri, M. Delavar, J. Mohajeri, and M. Salmasizadeh, "A keypolicy attribute-based temporary keyword search scheme for secure cloud storage," IEEE Transactions on Cloud Computing. Vol. 8, No. 3, pp. 660-671, April 2018. DOI: 10.1109/TCC.2018.2825983
DOI
|
3 |
Y. W. Hwang, and I. Y. Lee, "A Study on CP-ABE-Based Medical Data Sharing System with Key Abuse Prevention and Verifiable Outsourcing in the IoMT Environment," Sensors. Vol. 20, No. 17, pp.1-23, August 2020. DOI: https://doi.org/10.3390/s20174934
DOI
|
4 |
Lynn, B., The pairing-based cryptography (PBC) library, http://crypto.stanford.edu/pbc
|
5 |
C. J. Wang, and J. F. Luo, "A key-policy attribute-based encryption scheme with constant size ciphertext," In 2012 Eighth International Conference on Computational Intelligence and Security, Guangzhou, China, 2012, pp.447-451.
|
6 |
S. Y. Tan, K. W. Yeow, and S. O. Hwang, "Enhancement of a lightweight attribute-based encryption scheme for the Internet of Things," IEEE Internet of Things Journal, Vol. 6, No. 4, pp. 6384-6395, February 2019. DOI: 10.1109/JIOT.2019.2900631
DOI
|
7 |
X. Zheng, Z. Cai, and Y. Li, "Data Linkage in Smart IoT Systems: A Consideration from Privacy Perspective," IEEE Communications Magazine, Vol. 56, No. 9, pp. 55-61, September 2018. DOI: 10.1109/MCOM.2018.1701245
DOI
|
8 |
J. Bethencourt, A. Sahai, and B. Waters, "Ciphertext-policy attribute-based encryption," In 2007 IEEE symposium on security and privacy (SP'07), pp. 321-334, 2007.
|
9 |
C. Hu, J. Yu, X. Cheng, Z. Tian, and L. Sun, "CP-ABSC: An attributebased signcryption scheme to secure multicast communications in smart grids," In Mathematical foundations of computer science, Vol. 1, No. 1, pp. 77-100, February 2018. DOI: 10.3934/mfc.2018005
DOI
|
10 |
K. Zhang, J. Gong, S. Tang, J. Chen, X. Li, H. Qian, and Z. Cao, "Practical and efficient attribute-based encryption with constant-size ciphertexts in outsourced verifiable computation," In Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, pp.269-279, 2016.
|
11 |
J. Li, M. Wang, Y. Lu, Y. Zhang, and H. Wang, "ABKS-SKGA: Attributebased keyword search secure against keyword guessing attack," Computer Standards & Interfaces. Vol. 74, pp. 1-7, February 2021. DOI: https://doi.org/10.1016/j.csi.2020.103471
DOI
|
12 |
B. Girgenti, P. Perazzo, C. Vallati, F. Righetti, G. Dini, and G. Anastasi, "On the feasibility of attribute-based encryption on constrained IoT devices for smart systems," In 2019 IEEE International Conference on Smart Computing (SMARTCOMP), pp. 225-232, 2019.
|
13 |
M. Abdalla, M. Bellare, and P. Rogaway, "The oracle diffie-hellman assumptions and an analysis of dhies," In Cryptographers' Track at the RSA Conference, pp. 143-158, 2001.
|
14 |
H. Yin, Y. Xiong, J. Zhang, L. Ou, S. Liao, and Z Qin, "A key-policy searchable attribute-based encryption scheme for efficient keyword search and fine-grained access control over encrypted data," Electronics. Vol. 8, No. 3, pp. 1-20, February 2019. DOI: https://doi.org/10.3390/electronics8030265
DOI
|
15 |
J. P. Yaacoub, H. Noura, O. Salman, and A. Chehab, "Security analysis of drones systems: Attacks, limitations, and recommendations," Internet of Things, Vol. 11, No. 100218, pp. 1-39, May 2020. DOI:https://doi.org/10.1016/j.iot.2020.100218
DOI
|
16 |
M. Yahuza, M. Y. I. Idris, I. B. Ahmedy, A. W. A. Wahab, T. Nandy, N. M. Noor, and A. Bala, "Internet of drones security and privacy issues: Taxonomy and open challenges," IEEE Access, Vol. 9, pp. 57243-57270, April 2021. DOI: 10.1109/ACCESS.2021.3072030
DOI
|
17 |
V. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attribute-based encryption for fine-grained access control of encrypted data," In Proceedings of the 13th ACM conference on Computer and communications security, pp. 89-98, 2006.
|