Succinct multi-authority attribute-based access control for circuits with authenticated outsourcing
Published 2016 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
Succinct multi-authority attribute-based access control for circuits with authenticated outsourcing
Authors
Keywords
Access control, Multi authorities, Attribute-based encryption, General circuits, Authenticated outsourcing
Journal
SOFT COMPUTING
Volume 21, Issue 18, Pages 5265-5279
Publisher
Springer Nature
Online
2016-06-30
DOI
10.1007/s00500-016-2244-5
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- Anonymous Authentication for Wireless Body Area Networks With Provable Security
- (2017) Debiao He et al. IEEE Systems Journal
- Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing
- (2016) Jie Xu et al. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
- Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement
- (2016) Zhangjie Fu et al. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
- A privacy preserving three-factor authentication protocol for e-Health clouds
- (2016) Qi Jiang et al. JOURNAL OF SUPERCOMPUTING
- One-to-many authentication for access control in mobile pay-TV systems
- (2016) Debiao He et al. Science China-Information Sciences
- Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
- (2015) Xinyi Huang et al. IEEE TRANSACTIONS ON COMPUTERS
- Attribute-Based Encryption With Efficient Verifiable Outsourced Decryption
- (2015) Baodong Qin et al. IEEE Transactions on Information Forensics and Security
- New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations
- (2015) Xiaofeng Chen et al. IEEE Transactions on Information Forensics and Security
- Achieving Efficient Cloud Search Services: Multi-Keyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing
- (2015) Zhangjie FU et al. IEICE TRANSACTIONS ON COMMUNICATIONS
- Encoding Functions with Constant Online Rate, or How to Compress Garbled Circuit Keys
- (2015) Benny Applebaum et al. SIAM JOURNAL ON COMPUTING
- Dual trapdoor identity-based encryption with keyword search
- (2015) Jia’nan Liu et al. SOFT COMPUTING
- Achieving Efficient Cloud Search Services: Multi-Keyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing
- (2015) Zhangjie FU et al. IEICE TRANSACTIONS ON COMMUNICATIONS
- Robust Multi-Factor Authentication for Fragile Communications
- (2014) Xinyi Huang et al. IEEE Transactions on Dependable and Secure Computing
- An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks
- (2014) Qi Jiang et al. Peer-to-Peer Networking and Applications
- New Algorithms for Secure Outsourcing of Modular Exponentiations
- (2013) Xiaofeng Chen et al. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
- Securely Outsourcing Attribute-Based Encryption with Checkability
- (2013) Jin Li et al. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
- Improvement of robust smart-card-based password authentication scheme
- (2013) Qi Jiang et al. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS
- Attribute-based encryption schemes with constant-size ciphertexts
- (2011) Nuttapong Attrapadung et al. THEORETICAL COMPUTER SCIENCE
Add your recorded webinar
Do you already have a recorded webinar? Grow your audience and get more views by easily listing your recording on Peeref.
Upload NowAsk a Question. Answer a Question.
Quickly pose questions to the entire community. Debate answers and get clarity on the most important issues facing researchers.
Get Started