Author:
Mohanthy AyodhyaRam,Gurrala Jagadish
Reference16 articles.
1. S. H. Seo, M. Nabeel, X. Ding and E. Bertino, “An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds,” in IEEE Transactions on Knowledge and Data Engineering, vol. 26, no. 9, pp. 2107–2119, Sept. 2014.
2. S. Al-Riyami and K. Paterson, “Certificateless public key cryptography,” in Proc. ASIACRYPT 2003, C.-S. Laih, Ed. Berlin, Germany: Springer, LNCS 2894, pp. 452–473.
3. J. Bethencourt, A. Sahai, and B. Waters, “Cipher text-policy attribute-based encryption,” in Proc. 2007 IEEE Symp. SP, Taormina, Italy, pp. 321–334.
4. D. Boneh, X. Ding, and G. Tsudik, “Fine-grained control of security capabilities,” ACM Trans. Internet Technol., vol. 4, no. 1, pp. 60–82, Feb. 2004.
5. J. Camenisch, M. Dubovitskaya, and G. Neven, “Oblivious transfer with access control,” in Proc. 16th ACM Conf. CCS, New York, NY, USA, 2009, pp. 131–140.