Related references
Note: Only part of the references are listed.Lightweight and Expressive Fine-Grained Access Control for Healthcare Internet-of-Things
Shengmin Xu et al.
IEEE TRANSACTIONS ON CLOUD COMPUTING (2022)
Passive Attacks Against Searchable Encryption
Jianting Ning et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)
Revocable attribute-based encryption with decryption key exposure resistance and ciphertext delegation
Shengmin Xu et al.
INFORMATION SCIENCES (2019)
Match Me if You Can: Matchmaking Encryption and Its Applications
Giuseppe Ateniese et al.
ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT II (2019)
Auditable σ-Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing
Jianting Ning et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)
Secure Fine-Grained Access Control and Data Sharing for Dynamic Groups in the Cloud
Shengmin Xu et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)
Hidden policy ciphertext-policy attribute-based encryption with keyword search against keyword guessing attack
Shuo Qiu et al.
SCIENCE CHINA-INFORMATION SCIENCES (2017)
Access Control Encryption for General Policies from Standard Assumptions
Sam Kim et al.
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2017, PT I (2017)
FAME: Fast Attribute-based Message Encryption
Shashank Agrawal et al.
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2017)
Efficient attribute-based data sharing in mobile clouds
Yinghui Zhang et al.
PERVASIVE AND MOBILE COMPUTING (2016)
Access Control Encryption: Enforcing Information Flow with Cryptography
Ivan Damgard et al.
THEORY OF CRYPTOGRAPHY, TCC 2016-B, PT II (2016)
HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing
Zhiguo Wan et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2012)
Ciphertext-policy attribute-based encryption
John Bethencourt et al.
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS (2007)