Author:
Qin Bo,Deng Hua,Wu Qianhong,Domingo-Ferrer Josep,Naccache David,Zhou Yunya
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Safety, Risk, Reliability and Quality,Information Systems,Software
Reference26 articles.
1. Attrapadung, N., Libert, B., De Panafieu, E.: Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts. PKC 2011. LNCS 6571, pp. 90–108. Springer (2011)
2. Beimel, A.: Secure Schemes for Secret Sharing and Key Distribution. Ph.D. thesis, Israel Institute of Technology, Technion, Haifa, Israel (1996)
3. Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In IEEE Symposium on Security and Privacy, 2007, pp. 321–334. IEEE Press (2007)
4. Boneh, D., Boyen, X., Goh, E.: Hierarchical Identity Based Encryption with Constant Size Ciphertex. EUROCRYPT 2005. LNCS 3493, pp. 440-456. Springer (2005)
5. Boneh, D., Goh E., Nissim, K.: Evaluating 2-DNF Formulas on Ciphertexts. TCC 2005. LNCS 3378, pp. 325–341. Springer (2005)
Cited by
36 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Leveraging semantic context to establish access controls for secure cloud-based electronic health records;International Journal of Information Management Data Insights;2024-04
2. Comparison of attribute-based encryption schemes in securing healthcare systems;Scientific Reports;2024-03-26
3. Designing an Attribute-Based Encryption Scheme with an Enhanced Anonymity Model for Privacy Protection in E-Health;SN Computer Science;2024-01-13
4. Semantically Rich Differential Access to Secure Cloud EHR;2023 IEEE 9th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS);2023-05
5. Developing a Secure Architecture for Internet of Medical Things Using Attribute-Based Encryption;2022 IEEE/ACM 15th International Conference on Utility and Cloud Computing (UCC);2022-12