[1] |
DING S , LI C , LI H . A novel efficient pairing-free CP-ABE based on elliptic curve cryptography for IoT[J]. IEEE Access, 2018(6): 27336-27345.
|
[2] |
WATERS B , . Ciphertext-policy attribute-based encryption:an expressive,efficient,and provably secure realization[C]// International Workshop on Public Key Cryptography. Springer, 2011: 53-70.
|
[3] |
CHEUNG L , NEWPORT C . Provably secure ciphertext policy ABE[C]// The 14th ACM conference on Computer and communications security. ACM, 2007: 456-465.
|
[4] |
BETHENCOURT J , SAHAI A , WATERS B . Ciphertext-policy attribute-based encryption[C]// 2007 IEEE Symposium on Security and Privacy. IEEE, 2007: 321-334.
|
[5] |
JOUX A . A one round protocol for tripartite Diffie-Hellman[J]. Journal of Cryptology, 2004,17(4): 263-276.
|
[6] |
BONEH D , LYNN B , SHACHAM H . Short signatures from the Weil pairing[J]. Journal of Cryptology, 2004,17(4): 297-319.
|
[7] |
BONEH D , FRANKLIN M . Identity-based encryption from the Weil pairing[C]// Annual International Cryptology Conference. Springer, 2001: 213-229.
|
[8] |
ZHOU Z , HUANG D , WANG Z . Efficient privacy-preserving ciphertext-policy attribute based-encryption and broadcast encryption[J]. IEEE Transactions on Computers, 2013,64(1): 126-138.
|
[9] |
WANG S , LIANG K , LIU J K ,et al. Attribute-based data sharing scheme revisited in cloud computing[J]. IEEE Transactions on Information Forensics and Security, 2016,11(8): 1661-1673.
|
[10] |
GUO F , MU Y , SUSILO W ,et al. CP-ABE with constant-size keys for lightweight devices[J]. IEEE Transactions on Information Forensics and Security, 2014,9(5): 763-771.
|
[11] |
LI L , GU T , CHANG L ,et al. A ciphertext-policy attribute-based encryption based on an ordered binary decision diagram[J]. IEEE Access, 2017(5): 1137-1145.
|
[12] |
BEUCHAT J L , GONZáLEZ-DíAZ J E , MITSUNARI S ,et al. High-speed software implementation of the optimal ate pairing over Barreto-Naehrig curves[C]// International Conference on Pairing-Based Cryptography. Springer, 2010: 21-39.
|
[13] |
BARRETO P S L M , GALBRAITH S D , ó’HéIGEARTAIGH C ,et al. Efficient pairing computation on supersingular abelian varieties[J]. Designs,Codes and Cryptography, 2007,42(3): 239-271.
|
[14] |
CANARD S , DEVIGNE J , SANDERS O . Delegating a pairing can be both secure and efficient[C]// International Conference on Applied Cryptography and Network Security. Springer, 2014: 549-565.
|
[15] |
GUILLEVIC A , VERGNAUD D . Algorithms for outsourcing pairing computation[C]// International Conference on Smart Card Research and Advanced Applications. Springer, 2014: 193-211.
|
[16] |
CANARD S , DESMOULINS N , DEVIGNE J ,et al. On the implementation of a pairing-based cryptographic protocol in a constrained device[C]// International Conference on Pairing-Based Cryptography. Springer, 2012: 210-217.
|
[17] |
FREEMAN D , SCOTT M , TESKE E . A taxonomy of pairing-friendly elliptic curves[J]. Journal of Cryptology, 2010,23(2): 224-280.
|
[18] |
SCOTT M , . On the efficient implementation of pairing-based protocols[C]// IMA International Conference on Cryptography and Coding. Springer, 2011: 296-308.
|
[19] |
RIVAIN M . Fast and regular algorithms for scalar multiplication over elliptic curves[J]. IACR Cryptology ePrint Archive, 2011(1):338.
|
[20] |
CHEVALLIER-MAMES B , CORON J S , MCCULLAGH N ,et al. Secure delegation of elliptic-curve pairing[C]// International Conference on Smart Card Research and Advanced Applications. Springer, 2010: 24-35.
|
[21] |
CHEN X , SUSILO W , LI J ,et al. Efficient algorithms for secure outsourcing of bilinear pairings[J]. Theoretical Computer Science, 2015,562: 112-121.
|
[22] |
GREEN M , HOHENBERGER S , WATERS B . Outsourcing the decryption of abe ciphertexts[C]// The 20th USENIX Conference on Security. USENIX Association, 2011.
|
[23] |
LI J , CHEN X , LI J ,et al. Fine-grained access control system based on outsourced attribute-based encryption[C]// European Symposium on Research in Computer Security. Springer, 2013: 592-609.
|
[24] |
ODELU V , DAS A K . Design of a new CP-ABE with constant-size secret keys for lightweight devices using elliptic curve cryptography[J]. Security and Communication Networks, 2016,9(17): 4048-4059.
|
[25] |
ODELU V , DAS A K , KHAN M K ,et al. Expressive CP-ABE scheme for mobile devices in IoT satisfying constant-size keys and ciphertexts[J]. IEEE Access, 2017(5): 3273-3283.
|