Citation: | Zhiyuan ZHAO, Lei SUN, Jiafu HU, Shie ZHOU. Efficient Offline/Online Attribute Based Encryption with Verifiable Outsourced Decryption[J]. Journal of Electronics & Information Technology, 2018, 40(12): 2998-3006. doi: 10.11999/JEIT180122 |
KHAN S, PARKINSON S, and QIN Yongrui. Fog computing security: A review of current applications and security solutions[J]. Journal of Cloud Computing, 2017, 6(1): 19–41 doi: 10.1186/s13677-017-0090-3
|
SAHAI A and WATERS B. Fuzzy identity-based encryption[C]. Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, 2005: 457–473. doi: 10.1007/11426639_27.
|
GOYAL V, PANDEY O, SAHAI A, et al. Attribute-based encryption for fine-grained access control of encrypted data[C]. Proceedings of the 13th ACM Conference on Computer and Communications Security, Alexandria, USA, 2006: 89–98. doi: 10.1145/1180405.1180418.
|
BETHENCOURT J, SAHAI A, and WATERS B. Ciphertext-policy attribute-based encryption[C]. Proceedings of the IEEE Symposium on Security and Privacy, Berkeley, USA, 2007: 321–334. doi: 10.1109/SP.2007.11.
|
GREEN M, HOHENBERGER S, and WATERS B. Outsourcing the decryption of ABE ciphertexts[C]. Proceedings of the 20th USENIX Conference on Security, San Francisco, USA, 2011: 34.
|
LAI Junzuo, DENG R H, GUAN Chaowen, et al. Attribute-based encryption with verifiable outsourced decryption[J]. IEEE Transactions on Information Forensics and Security, 2013, 8(8): 1343–1354 doi: 10.1109/TIFS.2013.2271848
|
ZHAO Zhiyuan and WANG Jianhua. Verifiable outsourced ciphertext-policy attribute-based encryption for mobile cloud computing[J].KSII Transactions on Internet and Information Systems, 2017, 11(6): 3254–3272 doi: 10.3837/tiis.2017.06.024
|
FAN Kai, WANG Junxiong, WANG Xin, et al. A secure and verifiable outsourced access control scheme in fog-cloud computing[J]. Sensors, 2017, 17(7): 1695–1710 doi: 10.3390/s17071695
|
LI Jiguo, SHA Fengjie, ZHANG Yichen, et al. Verifiable outsourced decryption of attribute-based encryption with constant ciphertext length[J]. Security and Communication Networks, 2017, 2017: 1–11 doi: 10.1155/2017/3596205
|
ZHANG Rui, MA Hui, and LU Yao. Fine-grained access control system based on fully outsourced attribute-based encryption[J]. Journal of Systems and Software, 2017, 125(3): 344–353 doi: 10.1016/j.jss.2016.12.018
|
EVEN S, GOLDREICH O, and MICALI S. On-line/off-line digital signatures[C]. Proceedings of the Conference on the Theory and Application of Cryptology, Santa Barbara, USA, 1989: 263–275. doi: 10.1007/0-387-34805-0_24.
|
LIU J K, BAEK J, ZHOU Jianying, et al. Efficient online/offline identity-based signature for wireless sensor network[J]. International Journal of Information Security, 2010, 9(4): 287–296 doi: 10.1007/s10207-010-0109-y
|
GUO Fuchun, MU Yi, and CHEN Zhide. Identity-based online/offline encryption[C]. Proceedings of the International Conference on Financial Cryptography and Data Security, Cozumel, Mexico, 2008: 247–261. doi: 10.1007/978-3-540-85230-8_22.
|
LIU J K and ZHOU Jianying. An efficient identity-based online/offline encryption scheme[C]. Proceedings of the International Conference on Applied Cryptography and Network Security, Paris-Rocquencourt, France, 2009: 156–167. doi: 10.1007/978-3-642-01957-9_10.
|
CHOW S S M, LIU J K, and ZHOU Jianying. Identity-based online/offline key encapsulation and encryption[C]. Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, Hong Kong, China, 2011: 52–60. doi: 10.1145/1966913.1966922.
|
ROUSELAKIS Y and WATERS B. Practical constructions and new proof methods for large universe attribute-based encryption[C]. Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, Berlin, Germany, 2013: 463–474. doi: 10.1145/2508859.2516672.
|
HOHENBERGER S and WATERS B. Online/offline attribute-based encryption[C]. Proceedings of the International Workshop on Public Key Cryptography, Buenos Aires, Argentina, 2014: 293–310. doi: 10.1007/978-3-642-54631-0_17.
|
LIU Zechao, JIANG Z L, WANG Xuan, et al. Offline/online attribute-based encryption with verifiable outsourced decryption[J]. Concurrency and Computation:Practice and Experience, 2017, 29(7): 1–17 doi: 10.1002/cpe.3915
|
1. | 任志敏,曾文军,张良. 一种基于图片边缘轮廓的信息隐藏方法. 山西电子技术. 2022(04): 5-8 . ![]() | |
2. | 王海龙,柳林,纪文璐. 改进插值及择优阈值Canny算法的边缘检测. 计算机仿真. 2020(05): 394-398 . ![]() | |
3. | 吴翰,江巨浪. 基于边缘检测的高斯噪声滤波算法. 安庆师范大学学报(自然科学版). 2018(01): 38-40+50 . ![]() | |
4. | 刘应红,孙树亮. 基于汉明码和Logistic-正弦映射的图像隐写. 郑州大学学报(理学版). 2018(03): 22-26 . ![]() | |
5. | 宋晓峰,林少锋,韩鹍,寇万里. 图像自适应隐写和隐写分析技术进展. 电子信息对抗技术. 2017(01): 70-76 . ![]() | |
6. | 汤光明,边媛,韦大伟,高瞻瞻,朱垚臻. 一种动态更新失真代价的自适应±k隐写算法. 电子与信息学报. 2017(01): 58-65 . ![]() | |
7. | 王丽娜,谭选择,徐一波,翟黎明. 基于纹理复杂度的JPEG图像自适应隐写. 武汉大学学报(理学版). 2017(05): 421-426 . ![]() | |
8. | 谢印庆,姜莉,王鲁云,黄超,刘婷. 一种快速车流量检测算法. 哈尔滨理工大学学报. 2016(04): 19-24 . ![]() | |
9. | 王昂. 海上舰艇作战虚拟视景图像系统仿真研究. 计算机仿真. 2016(04): 419-423 . ![]() | |
10. | 李宁波,潘峰,李军,李秀广. 基于S-UNIWARD的图像自适应空域隐写术. 计算机工程与设计. 2016(10): 2627-2631 . ![]() |