Related references
Note: Only part of the references are listed.Full Verifiability for Outsourced Decryption in Attribute Based Encryption
Jiguo Li et al.
IEEE TRANSACTIONS ON SERVICES COMPUTING (2020)
Realizing Chosen Ciphertext Security Generically in Attribute-Based Encryption and Predicate Encryption
Venkata Koppula et al.
ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT II (2019)
Secure attribute-based data sharing for resource-limited users in cloud computing
Jin Li et al.
COMPUTERS & SECURITY (2018)
CCA-secure ABE with outsourced decryption for fog computing
Cong Zuo et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)
Analysis of an ABE Scheme with Verifiable Outsourced Decryption
Yongjian Liao et al.
SENSORS (2018)
Investigating the strategic behaviors in integrated speaking assessment
Heng-Tsung Danny Huang et al.
SYSTEM (2018)
Searchable ciphertext-policy attribute-based encryption with revocation in cloud storage
Jiguo Li et al.
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2017)
Zero-Knowledge Contingent Payments Revisited: Attacks and Payments for Services
Matteo Campanelli et al.
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2017)
Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing
Changyu Dong et al.
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2017)
Generic and Efficient Constructions of Attribute-Based Encryption with Verifiable Outsourced Decryption
Xianping Mao et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2016)
An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing
Shulan Wang et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)
TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage
Wei Li et al.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2016)
Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing
Jie Xu et al.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2016)
Revisiting Attribute-Based Encryption With Verifiable Outsourced Decryption
Suqing Lin et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)
Attribute-Based Encryption With Efficient Verifiable Outsourced Decryption
Baodong Qin et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)
CP-ABE With Constant-Size Keys for Lightweight Devices
Fuchun Guo et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2014)
Securely Outsourcing Attribute-Based Encryption with Checkability
Jin Li et al.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2014)
Attribute-Based Encryption With Verifiable Outsourced Decryption
Junzuo Lai et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2013)
Refereed delegation of computation
Ran Canetti et al.
INFORMATION AND COMPUTATION (2013)