Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2014, Article ID 193426, 13 pages
http://dx.doi.org/10.1155/2014/193426
Review Article

A Survey of Research Progress and Development Tendency of Attribute-Based Encryption

1State Key Laboratory of Integrated Services Networks, Xidian University, Xi’an 710071, China
2School of Life Science and Technology, Xidian University, Xi’an 710071, China
3Department of Computer Science, Wayne State University, Detroit, MI 48202, USA
4Department of Computer Science, Communication University of China, Beijing 100024, China

Received 22 January 2014; Accepted 11 June 2014; Published 2 July 2014

Academic Editor: Gloria Bordogna

Copyright © 2014 Liaojun Pang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Citations to this Article [10 citations]

The following is the list of published articles that have cited the current article.

  • Lyes Touati, Yacine Challal, Lyes Touati, and Yacine Challal, “Efficient CP-ABE Attribute/Key Management for IoT Applications,” 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing, pp. 343–350, . View at Publisher · View at Google Scholar
  • Tan Soo Fun, and Azman Samsudin, “Lattice Ciphertext-Policy Attribute-Based encryption from ring-LWE,” 2015 International Symposium on Technology Management and Emerging Technologies (ISTMET), pp. 258–262, . View at Publisher · View at Google Scholar
  • Divyashikha Sethia, Daya Gupta, and Huzur Saran, “Security framework for portable NFC mobile based health record system,” 2016 IEEE 12th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pp. 1–8, . View at Publisher · View at Google Scholar
  • José L. Hernández-Ramos, Jorge Bernal Bernabe, Victoria Moreno, and Antonio F. Skarmeta, “Preserving smart objects privacy through anonymous and accountable access control for a M2M-enabled internet of things,” Sensors (Switzerland), vol. 15, no. 7, pp. 15611–15639, 2015. View at Publisher · View at Google Scholar
  • Miguel Morales-Sandoval, Arturo Diaz-Perez, Miguel Morales-Sandoval, and Arturo Diaz-Perez, “DET-ABE: A Java API for Data Confidentiality and Fine-Grained Access Control from Attribute Based Encryption,” Information Security Theory And Practice, Wistp 2015, vol. 9311, pp. 104–119, 2015. View at Publisher · View at Google Scholar
  • Xiao-bin Cui, Shu-mao Zhang, Yue-xun Xu, Hong-wei Dang, Chun-xia Liu, Liang-hai Wang, Lan Yang, Jian-ming Hu, Wei-hua Liang, Jin-fang Jiang, Na Li, Yong Li, Yun-zhao Chen, and Feng Li, “PFN2, a novel marker of unfavorable prognosis, is a potential therapeutic target involved in esophageal squamous cell carcinoma,” Journal Of Translational Medicine, vol. 14, 2016. View at Publisher · View at Google Scholar
  • Huixian Li, and Liaojun Pang, “Efficient and Adaptively Secure Attribute-Based Proxy Reencryption Scheme,” International Journal of Distributed Sensor Networks, vol. 2016, pp. 1–12, 2016. View at Publisher · View at Google Scholar
  • Wei Chen, Zhiguang Qin, and Nyamsuren Vaanchig, “Fine-grained access control for cloud data sharing by secure and efficient attribute-revocable ciphertext-policy attribute-based encryption,” International Journal of Security and its Applications, vol. 10, no. 10, pp. 303–320, 2016. View at Publisher · View at Google Scholar
  • Wei Chen, Zhi-Guang Qin, and Nyamsuren Vaanchig, “Attribute-based access control with efficient and secure attribute revocation for cloud data sharing service,” Journal of Electronic Science and Technology, vol. 15, no. 1, pp. 90–98, 2017. View at Publisher · View at Google Scholar
  • Zhiguang Qin, Nyamsuren Vaanchig, and Wei Chen, “Ciphertext-Policy Attribute-Based Access Control with Effective User Revocation for Cloud Data Sharing System,” Proceedings - 2016 International Conference on Advanced Cloud and Big Data, CBD 2016, pp. 186–193, 2017. View at Publisher · View at Google Scholar