相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。An Efficient Ciphertext-Policy Weighted Attribute-Based Encryption for the Internet of Health Things
Hang Li et al.
IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS (2022)
EHRChain: A Blockchain-Based EHR System Using Attribute-Based and Homomorphic Cryptosystem
Fengqi Li et al.
IEEE TRANSACTIONS ON SERVICES COMPUTING (2022)
Quantum resistant key-exposure free chameleon hash and applications in redactable blockchain
Chunhui Wu et al.
INFORMATION SCIENCES (2021)
An Optimized Consortium Blockchain for Medical Information Sharing
Mingxiao Du et al.
IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT (2021)
MEdge-Chain: Leveraging Edge Computing and Blockchain for Efficient Medical Data Exchange
Alaa Awad Abdellatif et al.
IEEE INTERNET OF THINGS JOURNAL (2021)
Blockchain Mutability: Challenges and Proposed Solutions
Eugenia Politou et al.
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING (2021)
Blockchain-Assisted Secure Fine-Grained Searchable Encryption for a Cloud-Based Healthcare Cyber-Physical System
Mamta et al.
IEEE-CAA JOURNAL OF AUTOMATICA SINICA (2021)
A CP-ABE scheme based on multi-authority in hybrid clouds for mobile devices
Mande Xie et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2021)
Extended File Hierarchy Access Control Scheme with Attribute-Based Encryption in Cloud Computing
Jiguo Li et al.
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING (2021)
Attribute-Based Keyword Search over Hierarchical Data in Cloud Computing
Yinbin Miao et al.
IEEE TRANSACTIONS ON SERVICES COMPUTING (2020)
Efficient Fine-Grained Data Sharing Mechanism for Electronic Medical Record Systems with Mobile Devices
Hui Ma et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2020)
Efficient chameleon hash functions in the enhanced collision resistant model
Mojtaba Khalili et al.
INFORMATION SCIENCES (2020)
TrustAccess: A Trustworthy Secure Ciphertext-Policy and Attribute Hiding Access Control Scheme Based on Blockchain
Sheng Gao et al.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2020)
Policy-based Chameleon Hash for Blockchain Rewriting with Black-box Accountability
Yangguang Tian et al.
36TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2020) (2020)
Building Redactable Consortium Blockchain for Industrial Internet-of-Things
Ke Huang et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2019)
Redactable Blockchain in the Permissionless Setting
Dominic Deuber et al.
2019 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2019) (2019)
Redactable Blockchain using Enhanced Chameleon Hash Function
Kondapally Ashritha et al.
2019 5TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION SYSTEMS (ICACCS) (2019)
Cryptocurrencies-A Forensic Challenge or Opportunity for Law Enforcement? An INTERPOL Perspective
Giannis Tziakouris
IEEE SECURITY & PRIVACY (2018)
FAME: Fast Attribute-based Message Encryption
Shashank Agrawal et al.
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2017)
User Collusion Avoidance Scheme for Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption
Yogachandran Rahulamathavan et al.
IEEE TRANSACTIONS ON COMPUTERS (2016)
An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing
Shulan Wang et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)
Fuzzy Signatures: Relaxing Requirements and a New Construction
Takahiro Matsuda et al.
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2016 (2016)
The Bitcoin Backbone Protocol: Analysis and Applications
Juan Garay et al.
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT II (2015)
Charm: a framework for rapidly prototyping cryptosystems
Joseph A. Akinyele et al.
JOURNAL OF CRYPTOGRAPHIC ENGINEERING (2013)
Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption
Jinguang Han et al.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2012)
A new provably secure certificateless short signature scheme
Kyu Young Choi et al.
COMPUTERS & MATHEMATICS WITH APPLICATIONS (2011)
Ciphertext-policy attribute-based encryption
John Bethencourt et al.
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS (2007)