Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Reference :

    1. J. Baek, Q. H. Vu, J. K. Liu, X. Huang, and Y. Xiang, “A secure cloud computing based framework for big data information management of smart grid,” IEEE Trans. Cloud Comput., vol. 3, no. 2, pp. 233–244, Apr./Jun. 2015.
    2. A. Balu and K. Kuppusamy, “An expressive and provably secure ciphertext-policy attribute-based encryption,” Inf. Sci., vol. 276, no. 4, pp. 354–362, Aug. 2014.
    3. M. Belenkiy, J. Camenisch, M. Chase, M. Kohlweiss, A. Lysyanskaya, and H. Shacham, “Randomizable proofs and delegatable anonymous credentials,” in Proc. 29th Annu. Int. Cryptol. Conf., 2009, pp. 108–125.
    4. J. Bethencourt, A. Sahai, and B. Waters, “Ciphertextpolicy attributebased encryption,” in Proc. IEEE Symp. Secur. Privacy, May 2007, pp. 321–334.
    5. D. Boneh, B. Lynn, and H. Shacham, “Short signatures from the Weil pairing,” J. Cryptol., vol. 17, no. 4, pp. 297–319, 2004.
    6. M. Chase, “Multi-authority attribute based encryption,” in Proc. 4th Conf. Theory Cryptogr., 2007, pp. 515–534.
    7. M. Chase and S. S. M. Chow, “Improving privacy and security in multiauthority attribute-based encryption,” in Proc. 16th ACM Conf. Comput. Commun. Secur., 2009, pp. 121–130.
    8. L. Cheung and C. Newport, “Provably secure ciphertext policy ABE,” in Proc. 14th ACM Conf. Comput. Commun. Secur., 2007, pp. 456–465.
    9. S. S. M. Chow, “Removing escrow from identitybased encryption,” in Proc. 12th Int. Conf. Pract. Theory Public Key Cryptogr., 2009, pp. 256–276.
    10. C.-K. Chu, W.-T. Zhu, J. Han, J.-K. Liu, J. Xu, and J. Zhou, “Security concerns in popular cloud storage services,” IEEE Pervasive Comput., vol. 12, no. 4, pp. 50–57, Oct./Dec. 2013.
    11. A. De Caro and V. Iovino, “JPBC: Java pairing based cryptography,” in Proc. 16th IEEE Symp. Comput. Commun., Jun./Jul. 2011, pp. 850–855.
    12. H. Deng et al., “Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts,” Inf. Sci., vol. 275, no. 11, pp. 370–384, Aug. 2014.
    13. C.-I. Fan, V. S.-M. Huang, and H.-M. Ruan, “Arbitrary-state attributebased encryption with dynamic membership,” IEEE Trans. Comput., vol. 63, no. 8, pp. 1951–1961, Aug. 2014.
    14. V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption for fine-grained access control of encrypted data,” in Proc. 13th ACM Conf. Comput. Commun. Secur., 2006, pp. 89–98.
    15. J. Hur, “Improving security and efficiency in attribute-based data sharing,” IEEE Trans. Knowl. Data Eng., vol. 25, no. 10, pp. 2271–2282, Oct. 2013.

Recent Article