相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。Efficient CP-ABE Scheme With Shared Decryption in Cloud Storage
Ningyu Chen et al.
IEEE TRANSACTIONS ON COMPUTERS (2022)
Cryptographic Solutions for Cloud Storage: Challenges and Research Opportunities
Lei Zhang et al.
IEEE TRANSACTIONS ON SERVICES COMPUTING (2022)
CEMAR: a fine grained access control with revocation mechanism for centralized multi-authority cloud storage
K. Dhal et al.
JOURNAL OF SUPERCOMPUTING (2022)
Decentralized Attribute-Based Server-Aid Signature in the Internet of Things
Jiguo Li et al.
IEEE INTERNET OF THINGS JOURNAL (2022)
Hierarchical Identity-Based Online/Offline Encryption Scheme with Leakage Resilience
Qihong Yu et al.
SECURITY AND COMMUNICATION NETWORKS (2022)
Efficient Attribute Based Server-Aided Verification Signature
Yu Chen et al.
IEEE TRANSACTIONS ON SERVICES COMPUTING (2022)
Key escrow-free attribute based encryption with user revocation
Ruyuan Zhang et al.
INFORMATION SCIENCES (2022)
Attribute Based Encryption with Privacy Protection and Accountability for CloudIoT
Jiguo Li et al.
IEEE TRANSACTIONS ON CLOUD COMPUTING (2022)
Efficient Identity-Based Provable Multi-Copy Data Possession in Multi-Cloud Storage
Jiguo Li et al.
IEEE TRANSACTIONS ON CLOUD COMPUTING (2022)
Certificateless Public Integrity Checking of Group Shared Data on Cloud Storage
Jiguo Li et al.
IEEE TRANSACTIONS ON SERVICES COMPUTING (2021)
Identity-Based Privacy Preserving Remote Data Integrity Checking for Cloud Storage
Jiguo Li et al.
IEEE SYSTEMS JOURNAL (2021)
Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-owner Setting
Yinbin Miao et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2021)
Pairing-Free Certificate-Based Searchable Encryption Supporting Privacy-Preserving Keyword Search Function for IIoTs
Yang Lu et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2021)
O3-R-CP-ABE: An Efficient and Revocable Attribute-Based Encryption Scheme in the Cloud-Assisted IoMT System
Rui Guo et al.
IEEE INTERNET OF THINGS JOURNAL (2021)
Multi-Authority Attribute-Based Keyword Search over Encrypted Cloud Data
Yinbin Miao et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2021)
Extended File Hierarchy Access Control Scheme with Attribute-Based Encryption in Cloud Computing
Jiguo Li et al.
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING (2021)
Efficient and Fine-Grained Signature for IIoT With Resistance to Key Exposure
Yangyang Bao et al.
IEEE INTERNET OF THINGS JOURNAL (2021)
Attribute-Based Keyword Search over Hierarchical Data in Cloud Computing
Yinbin Miao et al.
IEEE TRANSACTIONS ON SERVICES COMPUTING (2020)
Full Verifiability for Outsourced Decryption in Attribute Based Encryption
Jiguo Li et al.
IEEE TRANSACTIONS ON SERVICES COMPUTING (2020)
Privacy-Preserving and Pairing-Free Multirecipient Certificateless Encryption With Keyword Search for Cloud-Assisted IIoT
Lu Yang et al.
IEEE INTERNET OF THINGS JOURNAL (2020)
Remote Data Checking With a Designated Verifier in Cloud Storage
Hao Yan et al.
IEEE SYSTEMS JOURNAL (2020)
ACS-FIT: A Secure and Efficient Access Control Scheme for Fog-enabled IoT
Richa Sarma et al.
2020 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC) (2020)
Key-Escrow Free Attribute-Based Multi-Keyword Search with Dynamic Policy Update in Cloud Computing
Uma Sankararao Varri et al.
2020 20TH IEEE/ACM INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND INTERNET COMPUTING (CCGRID 2020) (2020)
Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems
Yannan Li et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2019)
Efficient attribute-based encryption with attribute revocation for assured data deletion
Liang Xue et al.
INFORMATION SCIENCES (2019)
Hierarchical attribute based encryption with continuous leakage-resilience
Jiguo Li et al.
INFORMATION SCIENCES (2019)
Traceable and undeniable ciphertext-policy attribute-based encryption for cloud storage service
Gang Yu et al.
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS (2019)
Key-policy attribute-based encryption against continual auxiliary input leakage
Jiguo Li et al.
INFORMATION SCIENCES (2019)
An efficient access control scheme with outsourcing capability and attribute update for fog computing
Peng Zhang et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)
User Collusion Avoidance CP-ABE With Efficient Attribute Revocation for Cloud Storage
Jiguo Li et al.
IEEE SYSTEMS JOURNAL (2018)
Assured Data Deletion With Fine-Grained Access Control for Fog-Based Industrial Applications
Yong Yu et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2018)
A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage
Hao Yan et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)
RAAC: Robust and Auditable Access Control With Multiple Attribute Authorities for Public Cloud Storage
Kaiping Xue et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)
Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing
Jiguo Li et al.
IEEE TRANSACTIONS ON SERVICES COMPUTING (2017)
KSF-OABE: Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage
Jiguo Li et al.
IEEE TRANSACTIONS ON SERVICES COMPUTING (2017)
Ciphertext-Policy Attribute Based Encryption Supporting Any Monotone Access Structures Without Escrow
Zhao Qianqian et al.
CHINESE JOURNAL OF ELECTRONICS (2017)
User Collusion Avoidance Scheme for Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption
Yogachandran Rahulamathavan et al.
IEEE TRANSACTIONS ON COMPUTERS (2016)
Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-Based Encryption
Jinguang Han et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)
Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation
Huiling Qian et al.
INTERNATIONAL JOURNAL OF INFORMATION SECURITY (2015)
Removing escrow from ciphertext policy attribute-based encryption
Junbeom Hur et al.
COMPUTERS & MATHEMATICS WITH APPLICATIONS (2013)
HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing
Zhiguo Wan et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2012)
Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption
Jinguang Han et al.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2012)
Ciphertext-policy attribute-based encryption
John Bethencourt et al.
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS (2007)