Citation: | HUANG Qinlong, MA Zhaofeng, YANG Yixian, et al., “EABDS: Attribute-Based Secure Data Sharing with Efficient Revocation in Cloud Computing,” Chinese Journal of Electronics, vol. 24, no. 4, pp. 862-868, 2015, doi: 10.1049/cje.2015.10.033 |
Q. Huang, Z. Ma, J. Fu, X. Niu and Y. Yang, "Attribute based DRM scheme with efficient revocation in cloud computing", Journal of Computers, Vol.8, No.11, pp.2776-2781, 2013.
|
J. Lai, R.H. Deng, C. Guan and J. Weng, "Attribute-based encryption with verifiable outsourced decryption", IEEE Transactions on Information Forensics and Security, Vol.8, No.8, pp.1343-1354, 2013.
|
J. Hur, D. Koo, S.O. Hwang and K. Kang, "Removing escrow from ciphertext policy attribute-based encryption", Computers & Mathematics with Applications, Vol.65, No.9, pp.1310-1317, 2013.
|
M. Li, S. Yu, Y. Zheng, K. Ren and W. Lou, "Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption", IEEE Transactions on Parallel and Distributed Systems, Vol.24, No.1, pp.131-143, 2013.
|
J. Bethencourt, A. Sahai and B. Waters, "Ciphertext-policy attribute based encryption", Proceedings of 2007 IEEE Symposium on Security and Privacy, Berkeley, CA, USA, pp.321-334, 2007.
|
G. Wang, Q. Liu, J. Wu and M. Guo, "Hierarchical attributebased encryption and scalable user revocation for sharing data in cloud servers", Computers and Security, Vol.30, No.5, pp.320-331, 2011.
|
Z. Wan, J. Liu and R.H. Deng, "HASBE: A hierarchical attribute-based solution for flexible and scalable access control in cloud computing", IEEE Transactions on Information Forensics and Security, Vol.7, No.2, pp.743-754, 2012.
|
J. Hur, "Attribute-based secure data sharing with hidden policies in smart grid", IEEE Transactions on Parallel and Distributed Systems, Vol.24, No.11, pp.2171-2180, 2013.
|
M. Chase and S.S. Chow, "Improving privacy and security in multi-authority attribute-based encryption", Proceedings of the 16th ACM conference on Computer and Communications Security, Chicago, IL, USA, pp.121-130, 2009.
|
M. Yang, F. Liu, J. Han and Z. Wang, "An efficient attribute based encryption scheme with revocation for outsourced data sharing control", Proceedings of 2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control, Beijing, China, pp.516-520, 2011.
|
J. Hur, "Improving security and efficiency in attribute-based data sharing", IEEE Transactions on Knowledge and Data Engineering, Vol.25, No.10, pp.2271-2282, 2013.
|
S. Yu, C. Wang, K. Ren and W. Lou, "Achieving secure, scalable, and fine-grained data access control in cloud computing", Proceedings of IEEE INFOCOM 2010, San Diego, CA, USA, pp.1-9, 2010.
|
K. Yang, X. Jia, K. Ren and B. Zhang, "DAC-MACS: Effective data access control for multi-authority cloud storage systems", Proceedings of IEEE INFOCOM 2013, Turin, Italy, pp.2895- 2903, 2013.
|
J. Hur and D. Noh, "Attribute-based access control with efficient revocation in data outsourcing systems", IEEE Transactions on Parallel and Distributed Systems, Vol.22, No.7, pp.1214-1221, 2011.
|
X. Yi, M.G. Kaosar, R. Paulet and E. Bertino, "Single-database private information retrieval from fully homomorphic encryption", IEEE Transactions on Knowledge and Data Engineering, Vol.25, No.5, pp.1125-1134, 2013.
|