CCA-secure ABE with outsourced decryption for fog computing
- 1 January 2018
- journal article
- research article
- Published by Elsevier BV in Future Generation Computer Systems
- Vol. 78, 730-738
- https://doi.org/10.1016/j.future.2016.10.028
Abstract
No abstract availableKeywords
Funding Information
- National Natural Science Foundation of China (61472364, 61472365, 61572435)
- Natural Science Foundation of Zhejiang Province (LR13F020003, LZ16F020001, LR15G010001)
- CCF-Venustech Hongyan Research Initiative (2016-015)
This publication has 18 references indexed in Scilit:
- Cloud based data sharing with fine-grained proxy re-encryptionPervasive and Mobile Computing, 2016
- Revisiting Attribute-Based Encryption With Verifiable Outsourced DecryptionIEEE Transactions on Information Forensics and Security, 2015
- Generic and Efficient Constructions of Attribute-Based Encryption with Verifiable Outsourced DecryptionIEEE Transactions on Dependable and Secure Computing, 2015
- Attribute-Based Encryption With Efficient Verifiable Outsourced DecryptionIEEE Transactions on Information Forensics and Security, 2015
- Coalition Games for Spatio-Temporal Big Data in Internet of Vehicles Environment: A Comparative AnalysisIEEE Internet of Things Journal, 2015
- Toward efficient and privacy-preserving computing in big data eraIEEE Network, 2014
- Securely Outsourcing Attribute-Based Encryption with CheckabilityIEEE Transactions on Parallel and Distributed Systems, 2013
- Provably secure ciphertext policy ABEPublished by Association for Computing Machinery (ACM) ,2007
- Attribute-based encryption with non-monotonic access structuresPublished by Association for Computing Machinery (ACM) ,2007
- Attribute-based encryption for fine-grained access control of encrypted dataPublished by Association for Computing Machinery (ACM) ,2006