1 |
L. Trevisan and S. Vadhan, "Extracting randomness from samplable distributions," in Proc. of 41st Annual Symposium on Foundations of Computer Science, pp. 32-42, November 12-14, 2000.
|
2 |
Y. Dodis, R. Ostrovsky, L. Reyzin and A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data," SIAM journal on computing, vol. 38, no. 1, pp. 97- 139, March, 2008.
DOI
|
3 |
B. Lynn, The pairing-based cryptography (PBC) library[OL]. http://crypto.stanford.edu/pbc. 2006.
|
4 |
R. Buyya, C. S. Yeo, S. Venugopal and et al, "Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility," Future Generation computer systems, vol. 25, no. 6, pp. 599-616, June, 2009.
DOI
|
5 |
A. Sahai and B. Waters, "Fuzzy identity-based encryption," in Proc. of Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 457-473, May 22-26, 2005.
|
6 |
V. Goyal, O. Pandey, A. Sahai and B. Waters, "Attribute-based encryption for fine-grained access control of encrypted data," in Proc. of the 13th ACM conference on Computer and communications security, pp. 89-98, October 30-November 3, 2006.
|
7 |
A. Lewko, T. Okamoto, A. Sahai and et al, "Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption," in Proc. of Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 62-91, May 30-June 3, 2010.
|
8 |
J. Bethencourt, A. Sahai and B. Waters, "Ciphertext-policy attribute-based encryption," in Proc. of IEEE symposium on security and privacy, pp. 321-334, May 20-23, 2007.
|
9 |
Y. Rouselakis and B. Waters, "Practical constructions and new proof methods for large universe attribute-based encryption," in Proc. of the 2013 ACM SIGSAC conference on Computer & communications security, pp. 463-474, November 4-8, 2013.
|
10 |
K. Emura, A. Miyaji, A. Nomura and et al, "A ciphertext-policy attribute-based encryption scheme with constant ciphertext length," in Proc. of International Conference on Information Security Practice and Experience, pp. 13-23, April 13-15, 2009.
|
11 |
Y. Fang, Z. Wen, Q. Shen and et al, "POSTER: Ciphertext-policy attribute-based encryption method with secure decryption key generation and outsourcing decryption of ABE ciphertexts," in Proc. of International Conference on Security and Privacy in Communication Systems, pp. 585-589, October 26-29, 2015.
|
12 |
K. Zhang, J. Ma, J. Liu and H. Li, "Adaptively secure multi-authority attribute-based encryption with verifiable outsourced decryption," Science China Information Sciences, vol. 59, no. 9, pp. 99-105, September, 2016.
|
13 |
H. Wang, D. He, J. Shen and et al, "Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing," Soft Computing, pp. 1-11, July, 2016.
|
14 |
M. Green, S. Hohenberger and B. Waters, "Outsourcing the decryption of ABE ciphertexts," in Proc. of USENIX Security Symposium, pp.34-34, August 8-12, 2011.
|
15 |
F. Armknecht, J. M. Bohli, G. O. Karame and et al, "Outsourced proofs of retrievability," in Proc. of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 831-843, November 3-7, 2014.
|
16 |
D. Benjamin and M. J. Atallah, "Private and cheating-free outsourcing of algebraic computations," in Proc. of Sixth Annual Conference on Privacy, Security and Trust, pp. 240-245, October 1-3, 2008.
|
17 |
J. Li, C. Jia, J. Li and X. Chen, "Outsourcing encryption of attribute-based encryption with mapreduce," in Proc. of International Conference on Information and Communications Security, pp. 191-201, Otober 29-31, 2012.
|
18 |
J. Li, X. Chen, J. Li and et al, "Fine-grained access control system based on outsourced attribute-based encryption," in Proc. of European Symposium on Research in Computer Security, pp. 592-609, September 9-13, 2013.
|
19 |
Z. Zhou and D. Huang, "Efficient and secure data storage operations for mobile cloud computing," in Proc. of the 8th International Conference on Network and Service Management, pp. 37-45, October 22-26, 2012.
|
20 |
J. Li, X. Huang, J. Li and et al, "Securely outsourcing attribute-based encryption with checkability," IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 8, pp. 2201-2210, August, 2014.
DOI
|
21 |
J. Lai, R. H. Deng, C. Guan and J. Wang, "Attribute-based encryption with verifiable outsourced decryption," IEEE Transactions on information forensics and security, vol. 8, no. 8, pp. 1343-1354, August, 2013.
DOI
|
22 |
J. Li, F. Sha, Y. Zhang and et al, "Verifiable outsourced decryption of attribute-based encryption with constant ciphertext length," Security and Communication Networks, vol. 2017, no. 2017, January, 2017.
|
23 |
Q. Chai and G. Gong, "Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers," in Proc. of IEEE International Conference on Communications, pp. 917-922, June 10-15, 2012.
|