[1] |
Cui, Hui and Deng, Robert H and Wang, Guilin. An attribute-based framework for secure communications in vehicular ad hoc networks. IEEE/ACM Transactions on Networking. 27(2): 721--733, IEEE. 2019. [DOI ] |
[2] |
Guo, Rui and Li, Xiong and Zheng, Dong and Zhang, Yinghui. An attribute-based encryption scheme with multiple authorities on hierarchical personal health record in cloud. The Journal of Supercomputing. 76(7): 4884--4903, Springer. 2020. [DOI ] |
[3] |
Najafi, Aniseh and Bayat, Majid and Javadi, Hamid Haj Seyyed. Privacy Preserving Attribute-Based Encryption with Conjunctive Keyword Search for E-health Records in Cloud.. ISeCure. 13(2): 2021. [DOI ] |
[4] |
Aghili, Seyed Farhad and Sedaghat, Mahdi and Singel{\'e}e, Dave and Gupta, Maanak. MLS-ABAC: Efficient Multi-Level Security Attribute-Based Access Control scheme. Future Generation Computer Systems. 131: 75--90, Elsevier. 2022. [DOI ] |
[5] |
Rasori, Marco and La Manna, Michele and Perazzo, Pericle and Dini, Gianluca. A Survey on Attribute-Based Encryption Schemes Suitable for the Internet of Things. IEEE Internet of Things Journal. IEEE. 2022. [DOI ] |
[6] |
Tadayon, Mohammad Hesam and Khanmohammadi, Hadi and Sayad Haghighi, Mohammad. Dynamic and verifiable multi-secret sharing scheme based on Hermite interpolation and bilinear maps. IET Information Security. 9(4): 234--239, IET. 2015. [DOI ] |
[7] |
Green, Matthew and Hohenberger, Susan and Waters, Brent and others. Outsourcing the decryption of abe ciphertexts.. USENIX security symposium. 2011: 2011. [DOI ] |
[8] |
Mahdavi, Mahdi and Tadayon, Mohammad Hesam and Haghighi, Mohammad Sayad and Ahmadian, Zahra. IoT-friendly, pre-computed and outsourced attribute based encryption. Future Generation Computer Systems. 150: 115--126, Elsevier. 2024. [DOI ] |
[9] |
Odelu, Vanga and Das, Ashok Kumar and Khan, Muhammad Khurram and Choo, Kim-Kwang Raymond and Jo, Minho. Expressive CP-ABE scheme for mobile devices in IoT satisfying constant-size keys and ciphertexts. Ieee access. 5: 3273--3283, IEEE. 2017. [DOI ] |
[10] |
Wei, Jianghong and Chen, Xiaofeng and Huang, Xinyi and Hu, Xuexian and Susilo, Willy. RS-HABE: Revocable-storage and hierarchical attribute-based access scheme for secure sharing of e-health records in public cloud. IEEE Transactions on Dependable and Secure Computing. IEEE. 2019. [DOI ] |
[11] |
Sharma, Pratima and Jindal, Rajni and Borah, Malaya Dutta. Blockchain-based cloud storage system with CP-ABE-based access control and revocation process. The Journal of Supercomputing. 1--29, Springer. 2022. [DOI ] |
[12] |
Zhang, Ruyuan and Li, Jiguo and Lu, Yang and Han, Jinguang and Zhang, Yichen. Key Escrow-free Attribute Based Encryption with User Revocation. Information Sciences. Elsevier. 2022. [DOI ] |
[13] |
Chase, Melissa. Multi-authority attribute based encryption. Theory of cryptography conference, TCC'07. 515--534, 2007. [DOI ] |
[14] |
Sahai, Amit and Waters, Brent. Fuzzy identity-based encryption. Annual international conference on the theory and applications of cryptographic techniques, Eurocrypt'05. 457--473, 2005. [DOI ] |
[15] |
Khajouei-Nejad, Sedigheh and Jabbehdari, Sam and Haj Seyyed Javadi, Hamid and Moattar, Seyed Mohammad Hossein. Fuzzy Identity Based Encryption with a flexible threshold value. Journal of Communication Engineering. 10(2): 182--195, Journal of Communication Engineering. 2021. [DOI ] |
[16] |
Goyal, Vipul and Pandey, Omkant and Sahai, Amit and Waters, Brent. Attribute-based encryption for fine-grained access control of encrypted data. Proceedings of the 13th ACM conference on Computer and communications security. 89--98, 2006. [DOI ] |
[17] |
Bethencourt, John and Sahai, Amit and Waters, Brent. Ciphertext-policy attribute-based encryption. 2007 IEEE symposium on security and privacy (SP'07). 321--334, 2007. [DOI ] |
[18] |
Ostrovsky, Rafail and Sahai, Amit and Waters, Brent. Attribute-based encryption with non-monotonic access structures. Proceedings of the 14th ACM conference on Computer and communications security. 195--203, 2007. [DOI ] |
[19] |
Boneh, Dan and Gentry, Craig and Gorbunov, Sergey and Halevi, Shai and Nikolaenko, Valeria and Segev, Gil and Vaikuntanathan, Vinod and Vinayagamurthy, Dhinakaran. Fully key-homomorphic encryption, arithmetic circuit ABE and compact garbled circuits. Annual International Conference on the Theory and Applications of Cryptographic Techniques, Eurocrypt'14. 533--556, 2014. [DOI ] |
[20] |
Mahdavi, Mahdi Oliaee and Ahmadian, Zahra. Ciphertext Policy Attribute Based Encryption for Arithmetic circuits.. IACR Cryptol. ePrint Arch.. 2021: 3, 2021. |
[21] |
MahdaviOliaee, Mahdi and Ahmadian, Zahra. Fine-grained flexible access control: ciphertext policy attribute based encryption for arithmetic circuits. Journal of Computer Virology and Hacking Techniques. 1--14, Springer. 2022. [DOI ] |
[22] |
Yang, Kang and Wu, Guohua and Dong, Chengcheng and Fu, Xingbing and Li, Fagen and Wu, Ting. Attribute Based Encryption with Efficient Revocation from Lattices.. Int. J. Netw. Secur.. 22(1): 161--170, 2020. [DOI ] |
[23] |
Gorbunov, Sergey and Vaikuntanathan, Vinod and Wee, Hoeteck. Attribute-based encryption for circuits. Journal of the ACM (JACM). 62(6): 1--33, ACM New York, NY, USA. 2015. [DOI ] |
[24] |
Boyen, Xavier. Attribute-based functional encryption on lattices. Theory of Cryptography Conference, TCC'13. 122--142, 2013. [DOI ] |
[25] |
Khajouei-Nejad, Sedigheh and Jabbehdari, Sam and Seyyed Javadi, Hamid Haj and Hossein Moattar, Seyed Mohammad. Enhancing Lattice-Based Attribute-Based Encryption with Robust Fine-Grained Access Policies.. ISeCure. 17(1): Iranian Society of Cryptology. 2025. [DOI ] |
[26] |
Agrawal, Shweta and Boyen, Xavier and Vaikuntanathan, Vinod and Voulgaris, Panagiotis and Wee, Hoeteck. Functional encryption for threshold functions (or fuzzy IBE) from lattices. Public Key Cryptography--PKC 2012: 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings 15. 280--297, 2012. [DOI ] |
[27] |
Agrawal, Shweta and Boyen, Xavier and Vaikuntanathan, Vinod and Voulgaris, Panagiotis and Wee, Hoeteck. Fuzzy Identity Based Encryption from Lattices.. IACR Cryptol. ePrint Arch.. 2011: 414, 2011. |
[28] |
Mahdavi, Mahdi Oliaiy and Ameri, Mohammad Hassan and Mohajeri, Javad and Aref, Mohammad Reza. A verifiable delegated set intersection without pairing. 2017 Iranian Conference on Electrical Engineering (ICEE). 2047--2051, 2017. [DOI ] |
[29] |
Rivest, Ronald L and Shamir, Adi and Adleman, Leonard. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM. 21(2): 120--126, ACM New York, NY, USA. 1978. [DOI ] |
[30] |
Mahdavi, Mahdi and Abapour, Navid and Ahmadian, Zahra. Trustworthy Approaches to RSA: Efficient Exploitation Strategies Based on Common Modulus. 2024 IEEE 23rd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). (): 2535-2540, 2024. [DOI ] |
[31] |
Mumtaz, Majid and Ping, Luo. Forty years of attacks on the RSA cryptosystem: A brief survey. Journal of Discrete Mathematical Sciences and Cryptography. 22(1): 9--29, Taylor \& Francis. 2019. [DOI ] |
[32] |
Boneh, Dan and others. Twenty years of attacks on the RSA cryptosystem. Notices of the AMS. 46(2): 203--213, 1999. |
[33] |
Kiltz, Eike and O’Neill, Adam and Smith, Adam. Instantiability of RSA-OAEP under chosen-plaintext attack. Journal of Cryptology. 30(3): 889--919, Springer. 2017. [DOI ] |
[34] |
Cao, Nairen and O’Neill, Adam and Zaheri, Mohammad. Toward RSA-OAEP without random oracles. IACR International Conference on Public-Key Cryptography. 279--308, 2020. [DOI ] |
[35] |
Nasiraee, Hassan and Ashouri-Talouki, Maede. Anonymous decentralized attribute-based access control for cloud-assisted IoT. Future Generation Computer Systems. 110: 45--56, Elsevier. 2020. [DOI ] |
[36] |
Xiong, Hu and Zhao, Yanan and Peng, Li and Zhang, Hao and Yeh, Kuo-Hui. Partially policy-hidden attribute-based broadcast encryption with secure delegation in edge computing. Future Generation Computer Systems. 97: 453--461, Elsevier. 2019. [DOI ] |
[37] |
Javier Herranz. Attribute-based signatures from RSA. Theoretical Computer Science. 527: 73-82, 2014. [DOI ] |
[38] |
Tang, Fei and Li, Hongda and Liang, Bei. Attribute-based signatures for circuits from multilinear maps. International Conference on Information Security. 54--71, 2014. [DOI ] |
[39] |
Rani, Shikha and Ali, Syed Taqi. Expressive key-policy attribute-based constant-size signature. 2017 ISEA Asia Security and Privacy (ISEASP). 1--4, 2017. [DOI ] |
[40] |
Datta, Pratish and Okamoto, Tatsuaki and Takashima, Katsuyuki. Efficient attribute-based signatures for unbounded arithmetic branching programs. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. 104(1): 25--57, The Institute of Electronics, Information and Communication Engineers. 2021. [DOI ] |
[41] |
Li, Jin and Au, Man Ho and Susilo, Willy and Xie, Dongqing and Ren, Kui. Attribute-based signature and its applications. Proceedings of the 5th ACM symposium on information, computer and communications security. 60--69, 2010. [DOI ] |
[42] |
Shahandashti, Siamak F and Safavi-Naini, Reihaneh. Threshold attribute-based signatures and their application to anonymous credential systems. International conference on cryptology in Africa. 198--216, 2009. [DOI ] |
[43] |
Gagne, Martin and Narayan, Shivaramakrishnan and Safavi-Naini, Reihaneh. Short pairing-efficient threshold-attribute-based signature. International Conference on Pairing-Based Cryptography. 295--313, 2012. [DOI ] |
|