Fine-Grained Access Control System Based on Outsourced Attribute-Based Encryption
- 1 January 2013
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
Abstract
No abstract availableKeywords
This publication has 19 references indexed in Scilit:
- New Algorithms for Secure Outsourcing of Modular ExponentiationsLecture Notes in Computer Science, 2012
- Dynamic Credentials and Ciphertext Delegation for Attribute-Based EncryptionLecture Notes in Computer Science, 2012
- Memory DelegationLecture Notes in Computer Science, 2011
- Implementing Gentry’s Fully-Homomorphic Encryption SchemeLecture Notes in Computer Science, 2011
- Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted WorkersLecture Notes in Computer Science, 2010
- Methods and limitations of security policy reconciliationACM Transactions on Information and System Security, 2006
- How to Securely Outsource Cryptographic ComputationsLecture Notes in Computer Science, 2005
- Secure outsourcing of scientific computationsPublished by Elsevier BV ,2002
- Secure Server-Aided Signature GenerationLecture Notes in Computer Science, 2001
- Secure Integration of Asymmetric and Symmetric Encryption SchemesLecture Notes in Computer Science, 1999