Adaptively secure multi-authority attribute-based encryption with verifiable outsourced decryption

被引:0
|
作者
Kai Zhang
Jianfeng Ma
Jiajia Liu
Hui Li
机构
[1] Xidian University,School of Telecommunications Engineering
[2] Xidian University,School of Computer Science and Technology
[3] Xidian University,School of Cyber Engineering
来源
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [1] Adaptively secure multi-authority attribute-based encryption with verifiable outsourced decryption
    Kai ZHANG
    Jianfeng MA
    Jiajia LIU
    Hui LI
    [J]. Science China(Information Sciences), 2016, 59 (09) : 256 - 258
  • [2] Adaptively secure multi-authority attribute-based encryption with verifiable outsourced decryption
    Zhang, Kai
    Ma, Jianfeng
    Liu, Jiajia
    Li, Hui
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2016, 59 (09)
  • [3] Attribute-Based Encryption With Verifiable Outsourced Decryption
    Lai, Junzuo
    Deng, Robert H.
    Guan, Chaowen
    Weng, Jian
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (08) : 1343 - 1354
  • [4] Adaptively secure multi-authority attribute-based broadcast encryption in fog computing
    Chen, Jie
    Niu, Jiaxu
    Lei, Hao
    Lin, Li
    Ling, Yunhao
    [J]. COMPUTER NETWORKS, 2023, 232
  • [5] Attribute-Based Encryption with Publicly Verifiable Outsourced Decryption
    Zheng, Hui
    Shao, Jun
    Wei, Guiyi
    Hue, Li
    Pan, Bianjing
    Liu, Kai
    Mao, Xiaohang
    [J]. NETWORK AND SYSTEM SECURITY, NSS 2019, 2019, 11928 : 552 - 566
  • [6] Revisiting Attribute-Based Encryption With Verifiable Outsourced Decryption
    Lin, Suqing
    Zhang, Rui
    Ma, Hui
    Wang, Mingsheng
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (10) : 2119 - 2130
  • [7] Attribute-Based Encryption With Efficient Verifiable Outsourced Decryption
    Qin, Baodong
    Deng, Robert H.
    Liu, Shengli
    Ma, Siqi
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (07) : 1384 - 1393
  • [8] Robust, revocable, forward and backward adaptively secure attribute-based encryption with outsourced decryption
    Bkakria, Anis
    [J]. JOURNAL OF COMPUTER SECURITY, 2023, 31 (06) : 727 - 760
  • [9] A Multi-authority Attribute-based Encryption Scheme with Pre-decryption
    Chen, Danwei
    Wan, Liangqing
    Wang, Chen
    Pan, Su
    Ji, Yuting
    [J]. 2015 SEVENTH INTERNATIONAL SYMPOSIUM ON PARALLEL ARCHITECTURES, ALGORITHMS AND PROGRAMMING (PAAP), 2015, : 223 - 228
  • [10] Offline/online attribute-based encryption with verifiable outsourced decryption
    Liu, Zechao
    Jiang, Zoe L.
    Wang, Xuan
    Huang, Xinyi
    Yiu, S. M.
    Sadakane, Kunihiko
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (07):