REFERENCES

1. Renugadevi N, Swaminathan G, Kumar AS. Key management schemes for secure group communication in wireless networks - a survey. In: 2014 International Conference on Contemporary Computing and Informatics (IC3I); 2014. pp. 446–50.

2. Boyd C, Mathuria A, Stebila D. Protocols for authentication and key establishment Berlin, Heidelberg: Springer Berlin Heidelberg; 2020.

3. Steam. STEAM- & SPIELSTATISTIKEN; . Available from: https://store.steampowered.com/stats/?l=german. [Last accessed on 29 Nov 2023].

4. Activision Blizzard I. Activision Blizzard Announces Third-Quarter 2019 Financial Results; . Available from: https://investor.activision.com/static-files/594047f5-10b9-4fbf-b43b-45c8552cbd79. [Last accessed on 29 NOV 2021].

5. Department SR. Anzahl der zahlenden Streaming-Abonnenten von Netflix weltweit vom 3. Quartal 2011 bis zum 1. Quartal 2021. Available from: https://de.statista.com/statistik/daten/studie/196642/umfrage/abonnenten-von-netflix-quartalszahlen/. [Last accessed on 29 Nov 2023].

6. Brandt M. 155 Millionen Premium-Kunden. Available from: https://de.statista.com/infografik/13769/monatlich-aktive-nutzer-und-zahlende-abonnenten-von-spotify-weltweit/. [Last accessed on 29 Nov 2023].

7. Prantl T, Ten P, Iffländer L, et al. Evaluating the Performance of a State-of-the-Art Group-oriented Encryption Scheme for Dynamic Groups in an IoT Scenario. In: Proceedings of the 28th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS); 2020. pp. 1–8.

8. Nishat K, Purushothama BR. Group-oriented encryption for dynamic groups with constant rekeying cost. Security Comm Networks 2016;9:4120-37.

9. Rodeh O, Birman K, Dolev D. Optimized group rekey for group communication systems. Available from: https://www.researchgate.net/publication/2325687_Optimized_Group_Rekey_for_Group_Communication_Systems/. [Last accessed on 29 Nov 2023].

10. Waldvogel M, Caronni G, Sun D, Weiler N, Plattner B. The versaKey framework: versatile group key management. IEEE J Select Areas Commun 1999;17:1614-31.

11. Qiao Z, Liang S, Davis S, Jiang H. Survey of attribute based encryption. In: 15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD); 2014. pp. 1–6.

12. Bordogna G, Pang L, Yang J, Jiang Z. A survey of research progress and development tendency of attribute-based encryption. ScientificWorldJournal 2014:193426.

13. Priya A, Tiwari R. A survey: attribute based encryption for secure cloud. IJOSTHE 2018;5:12.

14. Waters B. Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Catalano D, Fazio N, Gennaro R, Nicolosi A, editors. Proceedings of the 14th International Conference on Practice and Theory in Public Key Cryptography (PKC). Berlin, Heidelberg: Springer Berlin Heidelberg; 2011. pp. 53–70.

15. Zhang Y, Deng RH, Xu S, Sun J, Li Q, Zheng D. Attribute-based encryption for cloud computing access control: a survey. ACM Comput Surv 2021;53:1-41.

16. Lee CC, Chung PS, Hwang MS. A survey on attribute-based encryption schemes of access control in cloud environments. Int J Netw Secur 2013;15:231-40.

17. Goyal V, Pandey O, Sahai A, Waters B. Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS). New York, NY, USA: Association for Computing Machinery; 2006. pp. 89–98.

18. Premkamal PK, Pasupleti SK, Alphonse PJA. Attribute based encryption in cloud computing: a survey, gap analysis, and future directions. J Netw Comput Appl 2018;108:37-52.

19. Ostrovsky R, Sahai A, Waters B. Attribute-based encryption with non-monotonic access structures. In: Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS). New York, NY, USA: Association for Computing Machinery; 2007. pp. 195–203.

20. Sahai A, Waters B. Fuzzy identity-based encryption. In: Cramer R, editor. Proceedings of the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT). Berlin, Heidelberg: Springer Berlin Heidelberg; 2005. pp. 457–73.

21. Bethencourt J, Sahai A, Waters B. Ciphertext-policy attribute-based encryption. In: 2007 IEEE Symposium on Security and Privacy (SP '07), Berkele, CA, USA, 2007, pp. 321-34,.

22. Rasori M, Manna ML, Perazzo P, Dini G. A survey on attribute-based encryption schemes suitable for the internet of things. IEEE Internet Things J 2022;9:8269-90.

23. Chase M. Multi-authority attribute based encryption. In: Vadhan SP, editor. Proceedings of the 4th Theory of Cryptography Conference (TCC). Berlin, Heidelberg: Springer Berlin Heidelberg; 2007. pp. 515–34.

24. Li Q, Ma J, Li R, Liu X, Xiong J, Chen D. Secure, efficient and revocable multi-authority access control system in cloud storage. Computers Security 2016;59:45-59.

25. Yu P, Wen Q, Ni W, et al. Decentralized, revocable and verifiable attribute-based encryption in hybrid cloud system. Wireless Pers Commun 2019;106:719-38.

26. Xue K, Xue Y, Hong J, et al. RAAC: robust and auditable access control with multiple attribute authorities for public cloud storage. IEEE Trans Inform Forensic Secur 2017;12:953-67.

27. Chase M, Chow SSM. Improving privacy and security in multi-authority attribute-based encryption. In: Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS). ACM. New York, NY, USA: Association for Computing Machinery; 2009. pp. 121–30.

28. Lewko A, Waters B. Decentralizing attribute-based encryption. In: Paterson KG, editor. Proceedings of the 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT). Berlin, Heidelberg: Springer Berlin Heidelberg; 2011. pp. 568–88.

29. Han J, Susilo W, Mu Y, Yan J. Privacy-preserving decentralized key-policy attribute-based encryption. IEEE Trans Parallel Distrib Syst 2012;23:2150-62.

30. Zhang K, Li H, Ma J, Liu X. Efficient large-universe multi-authority ciphertext-policy attribute-based encryption with white-box traceability. Sci China Inf Sci 2018;61.

31. Li J, Ren K, Zhu B, Wan Z. Privacy-aware attribute-based encryption with user accountability. In: Samarati P, Yung M, Martinelli F, Ardagna CA, editors. Proceedings of the 12th International Information Security Conference (ISC). Berlin, Heidelberg: Springer Berlin Heidelberg; 2009. pp. 347–62.

32. Wang Y, Chen K, Long Y, Liu Z. Accountable authority key policy attribute-based encryption. Sci China Inf Sci 2012;55:1631-38.

33. Ning J, Dong X, Cao Z, Wei L. Accountable authority ciphertext-policy attribute-based encryption with white-box traceability and public auditing in the cloud. In: Pernul G, Y A Ryan P, Weippl E, editors. Proceedings of the 20th European Symposium on Research in Computer Security (ESORICS). Cham: Springer International Publishing; 2015. pp. 270–89.

34. Zhang Y, Li J, Zheng D, Chen X, Li H. Towards privacy protection and malicious behavior traceability in smart health. Pers Ubiquit Comput 2017;21:815-30.

35. Ning J, Cao Z, Dong X, Gong J, Chen J. Traceable CP-ABE with short cipher- texts: How to catch people selling decryption devices on eBay efficiently. In: Askoxylakis I, Ioannidis S, Katsikas S, Meadows C, editors. Proceedings of the 21st European Symposium on Research in Computer Security (ESORICS). Cham: Springer International Publishing; 2016. pp. 551–289.

36. Liu Z, Duan S, Zhou P, Wang B. Traceable-then-revocable ciphertext-policy attribute-based encryption scheme. Future Gener Comp Sy 2017;93:903-13.

37. Nishide T, Yoneyama K, Ohta K. ABE with partially hidden encryptor-specified access structure. In: Bellovin SM, Gennaro R, Keromytis A, Yung M, editors. Proceedings of the 6th International Conference on Applied Cryptography and Network Security (ACNS). Berlin, Heidelberg: Springer Berlin Heidelberg; 2008. pp. 111–29.

38. Lai J, Deng RH, Li Y. Fully secure cipertext-policy hiding CP-ABE. In: Bao F, Weng J, editors. Proceedings of the 7th International Conference on Information Security Practice and Experience (ISPEC). Berlin, Heidelberg: Springer Berlin Heidelberg; 2011. pp. 24–39.

39. Phuong TVX, Yang G, Susilo W. Hidden ciphertext policy attribute-based encryption under standard assumptions. IEEE Trans Inform Forensic Secur 2016;11:35-45.

40. Zhang Y, Zheng D, Deng RH. Security and privacy in smart health: Efficient policy-hiding attribute-based access control. IEEE Internet Things J 2018;5:2130-45.

41. Zhang L, Hu G, Mu Y, Rezaeibagha F. Hidden ciphertext policy attribute-based encryption with fast decryption for personal health record system. IEEE Access 2019;7:33202-13.

42. Liang X, Cao Z, Lin H, Shao J. Attribute based proxy re-encryption with delegating capabilities. In: Proceedings of the 4th International Symposium on Information, Computer, and Communications Security (ASIACCS). ACM. New York, NY, USA: Association for Computing Machinery; 2009. pp. 276–86.

43. Luo S, Hu J, Chen Z. Ciphertext policy attribute-based proxy re-encryption. In: Soriano M, Qing S, López J, editors. Information and Communications Security. Berlin: Springer Berlin Heidelberg; 2010. pp. 401-15.

44. Liang K, Au MH, Liu JK, et al. A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing. Future Gener Comp Sy 2015;52:95-108.

45. Yang Y, Zhu H, Lu H, Weng J, Zhang Y, Choo KR. Cloud based data sharing with fine-grained proxy re-encryption. Pervasive Mob Comput 2016;28:122-34.

46. Zhang Y, Li J, Chen X, Li H. Anonymous attribute-based proxy re-encryption for access control in cloud computing. Security Comm Networks 2016;9:2397-411.

47. Hur J, Noh DK. Attribute-based access control with efficient revocation in data outsourcing systems. IEEE Trans Parallel Distrib Syst 2011;22:1214-21.

48. Yang K, Jia X, Ren K. Attribute-based fine-grained access control with efficient revocation in cloud storage systems. In: Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security. ACM. New York, NY, USA: Association for Computing Machinery; 2013. pp. 523–28.

49. Cui H, Deng RH, Li Y, Qin B. Server-aided revocable attribute-based encryption. In: Askoxylakis I, Ioannidis S, Katsikas S, Meadows C, editors. Proceedings of the European Symposium on Research in Computer Security (ESORICS). Cham: Springer International Publishing; 2016. pp. 570–87.

50. Xu S, Yang G, Mu Y, Deng RH. Secure fine-grained access control and data sharing for dynamic groups in the cloud. IEEE Trans Inform Forensic Secur 2018;13:2101-13.

51. Yang Y, Liu JK, Liang K, Cho KKR, Zhou J. Extended proxy-assisted approach: Achieving revocable fine-grained encryption of cloud data. In: Pernul G, Y A Ryan P, Weippl E, editors. Proceedings of the European Symposium on Research in Computer Security (ESORICS). Cham: Springer International Publishing; 2015. pp. 146–66.

52. Fan CI, Huang VSM, Ruan HM. Arbitrary-state attribute-based encryption with dynamic membership. IEEE Trans Comput 2013;63:1951-61.

53. Zhang Y, Chen X, Li J, Li H, Li F. Attribute-based data sharing with flexible and direct revocation in cloud computing. KSⅡ TⅡS 2014;8:4028-49.

54. Lewko A, Sahai A, Waters B. Revocation systems with very small private keys. In: 2010 IEEE Symposium on Security and Privacy (SP). IEEE. Los Alamitos, CA, USA: IEEE Computer Society; 2010. pp. 273–85.

55. Shi Y, Zheng Q, Liu J, Han Z. Directly revocable key-policy attribute-based encryption with verifiable ciphertext delegation. Inf Sci 2015;295:221-31.

56. Wang G, Liu Q, Wu J, Guo M. Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers. Comput Secur 2011;30:320-31.

57. Wan Z, Liu J, Deng RH. HASBE: A hierarchical attribute-based solution for flexible and scalable access control in cloud computing. IEEE Trans Inform Forensic Secur 2012;7:743-54.

58. Deng H, Wu Q, Qin B, et al. Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts. Inf Sci 2014;275:370-84.

59. Wang S, Zhou J, Liu JK, Yu J, Chen J, Xie W. An efficient file hierarchy attribute-based encryption scheme in cloud computing. IEEE Trans Inform Forensic Secur 2016;11:1265-77.

60. Teng W, Yang G, Xiang Y, Zhang T, Wang D. Attribute-based access control with constant-size ciphertext in cloud computing. IEEE Trans Cloud Comput ;6:617-27.

61. Li J, Yu Q, Zhang Y. Hierarchical attribute based encryption with continuous leakage-resilience. Inf Sci 2019;2:113-34.

62. Lai J, Deng RH, Li Y, Weng J. Fully secure key-policy attribute-based encryption with constant-size ciphertexts and fast decryption. In: Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security. New York, NY, USA: Association for Computing Machinery; 2014. pp. 239–48.

63. Prantl T, Ben Yahya AE, Dmitrienko A, et al. SIMPL: Secure IoT Management Platform. In: Proceedings of the 1st ITG Workshop on IT Security (ITSec 2020), April 2-3 2020. Tübingen: Universität Tübingen; 2020.

Journal of Surveillance, Security and Safety
ISSN 2694-1015 (Online)
Follow Us

Portico

All published articles are preserved here permanently:

https://www.portico.org/publishers/oae/

Portico

All published articles are preserved here permanently:

https://www.portico.org/publishers/oae/