Citation: | ZHAO Qianqian, ZHANG Yuqing, ZHANG Guanghua, et al., “Ciphertext-Policy Attribute Based Encryption Supporting Any Monotone Access Structures Without Escrow,” Chinese Journal of Electronics, vol. 26, no. 3, pp. 640-646, 2017, doi: 10.1049/cje.2017.04.002 |
W. Zhu, J. Yu, T. Wang, P. Zhang and W. Xie, "Efficient attribute-based encryption from R-LWE", Chinese Journal of Electronics, Vol.23, No.4, pp.778-782, 2014
|
P. Xu, Y. Tang, W.B. Jiang, H. Jin and D.Q. Zou, "Ciphertextpolicy attribute-based encryption with short keys", Chinese Journal of Electronics, Vol.23, No.4, pp.655-660, 2014.
|
A. Sahai and B. Waters, "Fuzzy identity-based encryption", Proceedings Advances in Cryptology-EUROCRYPT, Aarhus, Denmark, pp.457-473, 2005.
|
V. Goyal, O. Pandey, A. Sahai and B. Waters, "Attribute-based encryption for fine-grained access control of encrypted data", Proceedings of ACM Conference Computer and Comm. Security, Alexandria, Virginia, USA, pp.89-98, 2006.
|
J. Bethencourt, A. Sahai and B. Waters, "Ciphertext-policy attribute-based encryption",Proceeding of IEEE Symposium Security and Privacy, Oakland, California, USA, pp.321-334, 2007.
|
B. Waters, "Ciphertext-policy attribute-based encryption:An expressive, efficient, and provably secure realization", Proceeding of Public Key Cryptography, Taormina, Italy, Vol.6571, pp.53-70, 2011.
|
M. Chase, "Multi-authority attribute based encryption", Theory of Cryptography, Vol.4392, pp.515-534, 2007.
|
V. Bozovic, D. Socek, R. Steinwandt and V.I. Villanyi, "Multiauthority attribute based encryption with honest-but-curious central authority", International Journal of Computer Mathematics, Vol.89, No.3, pp.268-283, 2012.
|
H. Lin, Z.F. Cao, X.H. Liang and J. Shao, "Secure threshold multi-authority attribute based encryption without a central authority", IEEE INDOCRYPT, LNCS, Vol.5365, pp.426-436, 2008.
|
J. Hur, "Improving security and efficiency in attribute-based data sharing", IEEE Transactions on Knowledge and Data Engineering, Vol.25, No.10, pp.2271-2282, 2013.
|
J. Hur, D.Y. Koo, S.O. Hwang and K. Kang, "Removing escrow from ciphertext policy attribute-based encryption", Computers and Mathematics with Applications, Vol.65, No.9, pp.1310-1317, 2013.
|
M. Belenkiy, J. Camenisch, M. Chase, M. Kohlweiss, A. Hysyans-kaya and H. Shacham, "Randomizable proofs and delegatable anonymous credentials", Proceeding of Advances in Cryptology-Crypto, Santa Barbara, California, USA, pp.108-125, 2009.
|
A. Lewko, T. Okamoto, A. Sahai, K. Takashima and B. Waters, "Fully secure functional encryption:Attribute-based encryption and (hierarchical) inner product encryption", Proceedings Advances in Cryptology-EUROCRYPT, Riviera, French, pp.62-91, 2010.
|
Z. Liu, Z. Cao and D.S. Wong, "White-box traceable ciphertextpolicy attribute-based encryption supporting any monotone access structures", IEEE Transactions on Information Forensics and Security, Vol.8, No.1, pp.76-88, 2013.
|
Y.T. Wang, K.F. Chen and J.H. Chen, "Attribute-based traitor tracing", Journal of Information Science and Engineering, Vol.27, No.1, pp.181-195, 2011.
|
A. Beimel, "Secure schemes for secret sharing and key distribution", Ph.D. thesis, Israel Institute of Technology, Technion, Haifa, Israel, 1996.
|
D. Boneh, E. Goh and K. Nissim, "Evaluating 2-dnf formulas on ciphertexts", Proceedings of TCC, Cambridge, Massachusetts, USA, pp.325-342, 2005.
|
A. Lewko and B. Waters, "New techniques for dual system encryption and fully secure hibe with short ciphertexts", Proceeding of TCC, Zurich, Switzerland, 2010.
|
M. Chase and S.S.M. Chow, "Improving privacy and security in multi-authority attribute-based encryption", Proceeding of ACM Conference Computer and Communication Security, Chicago, Illinois, USA, pp.121-130, 2009.
|
S.S.M. Chow, "Removing escrow from identity-based encryption", Proceeding of International Conference Practice and Theory in Public Key Cryptography, California, USA, pp.256-276, 2009.
|
P. Paillier, "Public-key cryptosystems based on composite degree residuosity classes", Proceedings Advances in CryptologyEUROCRYPT, Prague, Czech Republic, Vol.1592, pp.223-238, 1999.
|