References
- S. Belguith, N. Kaaniche, M. Laurent, A. Jemai, and R. Attia, Constant-size threshold attribute based signcryption for cloud applications, SECRYPT 2017 : 14th International Conference on Security and Cryptography, Vol. 6, Scitepress, Madrid, Spain, 2017, pp. 212–225.
- J. Bethencourt, A. Sahai, and B. Waters, Ciphertext-policy attribute-based encryption, Security and Privacy, 2007. SP'07. IEEE Symposium on, IEEE, 2007, pp. 321–334.
- J. Birkett and D. Stebila, Predicate-based key exchange, Information Security and Privacy, Springer, 2010, pp. 282–299.
- S. Chakraborty, Y.S. Rao, and C.P. Rangan, An efficient attribute-based authenticated key exchange protocol, in Cryptology and Network Security, S. Capkun, and S. S. M. Chow, eds., Springer International Publishing, Cham, 2018, pp. 493–503.
- K. Emura, A. Miyaji, and M.S. Rahman, Dynamic attribute-based signcryption without random oracles, Int. J. Appl. Cryptol. 2 (2012), pp. 199–211.
- M. Gagné, S. Narayan, and R. Safavi-Naini, Threshold attribute-based signcryption, in Security and Cryptography for Networks: 7th International Conference, SCN 2010, Amalfi, Italy, September 13-15, 2010. Proceedings, J. A. Garay, and R. De Prisco, eds., Springer, Berlin Heidelberg, 2010, pp. 154–171.
- M. Gagné, S. Narayan, and R. Safavi-Naini, Short pairing-efficient threshold-attribute-based signature, International Conference on Pairing-Based Cryptography, Springer, 2012, pp. 295–313.
- C. Gentry, S. Halevi, H.K. Maji, and A. Sahai, Zeroizing without zeroes: cryptanalyzing multilinear maps without encodings of zero, IACR Cryptology EPrint Archive 2014 (2014), pp. 929.
- M.C. Gorantla, C. Boyd, and J.M.G. Nieto, Attribute-based authenticated key exchange, Information Security and Privacy, Springer, 2010, pp. 300–317.
- V. Goyal, O. Pandey, A. Sahai, and B. Waters, Attribute-based encryption for fine-grained access control of encrypted data, Proceedings of the 13th ACM conference on computer and communications security, Acm, 2006, pp. 89–98.
- H. Krawczyk, Cryptographic extraction and key derivation: The hkdf scheme, CRYPTO, Vol. 6223, Springer, 2010, pp. 631–648.
- B. LaMacchia, K. Lauter, and A. Mityagin, Stronger security of authenticated key exchange, Provable Security, Springer, 2007, pp. 1–16.
- J. Li, M.H. Au, W. Susilo, D. Xie, and K. Ren, Attribute-based signature and its applications, Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ACM, 2010, pp. 60–69.
- J. Liu, X. Huang, and J.K. Liu, Secure sharing of personal health records in cloud computing: Ciphertext-policy attribute-based signcryption, Future Generation Computer Systems, Vol. 52, 2015, pp. 67–76. Special Section: Cloud Computing: Security, Privacy and Practice.
- H.K. Maji, M. Prabhakaran, and M. Rosulek, Attribute-based signatures, Topics in Cryptology–CT-RSA 2011, Springer, 2011, pp. 376–392.
- Q.M. Malluhi, A. Shikfa, and V.C. Trinh, A ciphertext-policy attribute-based encryption scheme with optimized ciphertext size and fast decryption, Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, ACM, 2017, pp. 230–240.
- E. Miles, A. Sahai, and M. Zhandry, Annihilation attacks for multilinear maps: Cryptanalysis of indistinguishability obfuscation over ggh13, Annual Cryptology Conference, Springer, 2016, pp. 629–658.
- V. Odelu, A.K. Das, Y.S. Rao, S. Kumari, M.K. Khan, and K.-K.R. Choo, Pairing-based cp-abe with constant-size ciphertexts and secret keys for cloud environment, Computer Standards & Interfaces 54 (2017), pp. 3–9.
- T. Okamoto and D. Pointcheval, The gap-problems: A new class of problems for the security of cryptographic schemes, Public Key Cryptography, Springer, 2001, pp. 104–118.
- T. Okamoto and K. Takashima, Efficient attribute-based signatures for non-monotone predicates in the standard model, Cloud Computing, IEEE Transactions on, Vol. 2, 2014, pp. 409–421.
- R. Ostrovsky, A. Sahai, and B. Waters, Attribute-based encryption with non-monotonic access structures, Proceedings of the 14th ACM conference on Computer and communications security, ACM, 2007, pp. 195–203.
- T. Pandit, S.K. Pandey, and R Barua, Attribute-based signcryption: Signer privacy, strong unforgeability and ind-cca2 security in adaptive-predicates attack Provable Security, Springer, 2014, pp. 274–290.
- Y.S. Rao, A secure and efficient ciphertext-policy attribute-based signcryption for personal health records sharing in cloud computing, Future Generation Computer Systems 67 (2017), pp. 133–151.
- Y.S Rao, A secure and efficient ciphertext-policy attribute-based signcryption for personal health records sharing in cloud computing, Future Generation Computer Systems 67 (2017), pp. 133–151.
- Y.S. Rao and R. Dutta, Efficient attribute-based signature and signcryption realizing expressive access structures, Int. J. Inform. Sec. 15 (2016), pp. 81–109.
- A. Sahai and B. Waters, Fuzzy identity-based encryption, Advances in Cryptology–EUROCRYPT 2005, Springer, 2005, pp. 457–473.
- S.F. Shahandashti and R. Safavi-Naini, Threshold attribute-based signatures and their application to anonymous credential systems, Progress in Cryptology–AFRICACRYPT 2009, Springer, 2009, pp. 198–216.
- R. Steinwandt and A.S. Corona, Attribute-based group key establishment, IACR Cryptology EPrint Archive 2010 (2010), pp. 235.
- Y. Tian, G. Yang, Y. Mu, K. Liang, and Y. Yu, One-round attribute-based key exchange in the multi-party setting, International Conference on Provable Security, Springer, 2016, pp. 227–243.
- B. Waters, Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization, Public Key Cryptography–PKC 2011, Springer, 2011, pp. 53–70.
- K. Yoneyama, Strongly secure two-pass attribute-based authenticated key exchange, Pairing-Based Cryptography-Pairing 2010, Springer, 2010, pp. 147–166.
- K. Yoneyama, Two-party round-optimal session-policy attribute-based authenticated key exchange without random oracles, Information Security and Cryptology-ICISC 2011, Springer, 2011, pp. 467–489.
- H. Zheng, J. Qin, J. Hu, and Q. Wu, Threshold attribute-based signcryption and its application to authenticated key agreement, Security and Communication Networks 9 (2016), pp. 4914–4923.