4.5 Article

Attribute-based encryption with outsourced decryption in blockchain

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

Full Verifiability for Outsourced Decryption in Attribute Based Encryption

Jiguo Li et al.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2020)

Proceedings Paper Computer Science, Information Systems

Realizing Chosen Ciphertext Security Generically in Attribute-Based Encryption and Predicate Encryption

Venkata Koppula et al.

ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT II (2019)

Article Computer Science, Information Systems

Secure attribute-based data sharing for resource-limited users in cloud computing

Jin Li et al.

COMPUTERS & SECURITY (2018)

Article Computer Science, Theory & Methods

CCA-secure ABE with outsourced decryption for fog computing

Cong Zuo et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Chemistry, Analytical

Analysis of an ABE Scheme with Verifiable Outsourced Decryption

Yongjian Liao et al.

SENSORS (2018)

Article Education & Educational Research

Investigating the strategic behaviors in integrated speaking assessment

Heng-Tsung Danny Huang et al.

SYSTEM (2018)

Article Engineering, Electrical & Electronic

Searchable ciphertext-policy attribute-based encryption with revocation in cloud storage

Jiguo Li et al.

INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2017)

Proceedings Paper Computer Science, Information Systems

Zero-Knowledge Contingent Payments Revisited: Attacks and Payments for Services

Matteo Campanelli et al.

CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2017)

Proceedings Paper Computer Science, Information Systems

Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing

Changyu Dong et al.

CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2017)

Article Computer Science, Hardware & Architecture

Generic and Efficient Constructions of Attribute-Based Encryption with Verifiable Outsourced Decryption

Xianping Mao et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2016)

Article Computer Science, Theory & Methods

An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing

Shulan Wang et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)

Article Computer Science, Theory & Methods

TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage

Wei Li et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2016)

Article Computer Science, Theory & Methods

Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing

Jie Xu et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2016)

Article Computer Science, Theory & Methods

Revisiting Attribute-Based Encryption With Verifiable Outsourced Decryption

Suqing Lin et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)

Article Computer Science, Theory & Methods

Attribute-Based Encryption With Efficient Verifiable Outsourced Decryption

Baodong Qin et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)

Article Computer Science, Theory & Methods

CP-ABE With Constant-Size Keys for Lightweight Devices

Fuchun Guo et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2014)

Article Computer Science, Theory & Methods

Securely Outsourcing Attribute-Based Encryption with Checkability

Jin Li et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2014)

Article Computer Science, Theory & Methods

Attribute-Based Encryption With Verifiable Outsourced Decryption

Junzuo Lai et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2013)

Article Computer Science, Theory & Methods

Refereed delegation of computation

Ran Canetti et al.

INFORMATION AND COMPUTATION (2013)