A pairing-based cryptographic approach for data security in the cloud
Published 2017 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
A pairing-based cryptographic approach for data security in the cloud
Authors
Keywords
Cloud storage, Attribute-based encryption, Short signatures, Pairings
Journal
International Journal of Information Security
Volume 17, Issue 4, Pages 441-461
Publisher
Springer Nature
Online
2017-04-28
DOI
10.1007/s10207-017-0375-z
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- A privacy-preserved full-text retrieval algorithm over encrypted data for cloud storage applications
- (2017) Wei Song et al. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING
- An efficient and secure privacy-preserving approach for outsourced data of resource constrained mobile devices in cloud computing
- (2016) Syam Kumar Pasupuleti et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- A Novel Multi-Receiver Signcryption Scheme with Complete Anonymity
- (2016) Liaojun Pang et al. PLoS One
- An efficient and secure attribute based signcryption scheme with LSSS access structure
- (2016) Hanshu Hong et al. SpringerPlus
- Practical Attribute-Based Encryption: Traitor Tracing, Revocation and Large Universe
- (2015) Zhen Liu et al. COMPUTER JOURNAL
- Secure sharing of Personal Health Records in cloud computing: Ciphertext-Policy Attribute-Based Signcryption
- (2015) Jianghua Liu et al. Future Generation Computer Systems-The International Journal of eScience
- SkyCDS: A resilient content delivery service based on diversified cloud storage
- (2015) J.L. Gonzalez et al. SIMULATION MODELLING PRACTICE AND THEORY
- Report on Pairing-based Cryptography
- (2015) Dustin Moody et al. JOURNAL OF RESEARCH OF THE NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY
- A Survey of Provably Secure Searchable Encryption
- (2014) Christoph Bösch et al. ACM COMPUTING SURVEYS
- Secure and efficient data-sharing in clouds
- (2014) Jiang Zhang et al. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE
- Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts
- (2014) Hua Deng et al. INFORMATION SCIENCES
- Secure and efficient privacy-preserving public auditing scheme for cloud storage
- (2013) Solomon Guadie Worku et al. COMPUTERS & ELECTRICAL ENGINEERING
- Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage
- (2012) Dongyoung Koo et al. COMPUTERS & ELECTRICAL ENGINEERING
- Removing escrow from ciphertext policy attribute-based encryption
- (2012) Junbeom Hur et al. COMPUTERS & MATHEMATICS WITH APPLICATIONS
- Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks
- (2012) Junbeom Hur et al. IEEE-ACM TRANSACTIONS ON NETWORKING
- HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing
- (2011) Zhiguo Wan et al. IEEE Transactions on Information Forensics and Security
- A survey on security issues in service delivery models of cloud computing
- (2010) S. Subashini et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
Find the ideal target journal for your manuscript
Explore over 38,000 international journals covering a vast array of academic fields.
SearchCreate your own webinar
Interested in hosting your own webinar? Check the schedule and propose your idea to the Peeref Content Team.
Create Now