Belguith, S., Jemai, A., and Attia, R. (2015). Enhancing
data security in cloud computing using a lightweight
cryptographic algorithm. In ICAS 2015 : The Eleventh
International Conference on Autonomic and Autono-
mous Systems, pages 98–103. IARIA.
Belguith, S., Kaaniche, N., Jemai, A., Laurent, M., and
Attia, R. (2016). Pabac: a privacy preserving attri-
bute based framework for fine grained access control
in clouds. In 13th IEEE International Conference on
Security and Cryptography(Secrypt).
Belguith, S., Kaaniche, N., Laurent, M., Jemai, A., and At-
tia, R. (2017). Constant-size threshold attribute ba-
sed signcryption for cloud applications. In SECRYPT
2017: 14th International Conference on Security and
Cryptography, volume 6, pages 212–225.
Belguith, S., Kaaniche, N., Laurent, M., Jemai, A., and
Attia, R. (2018). Phoabe: Securely outsourcing
multi-authority attribute based encryption with policy
hidden for cloud assisted iot. Computer Networks,
133:141–156.
Bethencourt, J., Sahai, A., and Waters, B. (2007).
Ciphertext-policy attribute-based encryption. In IEEE
Symposium on Security and Privacy.
Boneh, D., Boyen, X., and Goh, E.-J. (2005). Hierarchical
identity based encryption with constant size cipher-
text. In Annual International Conference on the The-
ory and Applications of Cryptographic Techniques,
pages 440–456. Springer.
Coates, A., Hammoudeh, M., and Holmes, K. G. (2017). In-
ternet of things for buildings monitoring: Experiences
and challenges. In Proceedings of the International
Conference on Future Networks and Distributed Sys-
tems, page 38. ACM.
Emura, K., Miyaji, A., Nomura, A., Omote, K., and
Soshi, M. (2009). A ciphertext-policy attribute-based
encryption scheme with constant ciphertext length.
In International Conference on Information Security
Practice and Experience, pages 13–23. Springer.
Esposito, C. and Ciampi, M. (2015). On security in pu-
blish/subscribe services: a survey. IEEE Communica-
tions Surveys & Tutorials, 17(2):966–997.
Farhan, M., Jabbar, S., Aslam, M., Hammoudeh, M.,
Ahmad, M., Khalid, S., Khan, M., and Han, K.
(2018). Iot-based students interaction framework
using attention-scoring assessment in elearning. Fu-
ture Generation Computer Systems, 79:909–919.
Ge, A., Zhang, R., Chen, C., Ma, C., and Zhang, Z. (2012).
Threshold ciphertext policy attribute-based encryption
with constant size ciphertexts. In Australasian Con-
ference on Information Security and Privacy, pages
336–349. Springer.
Ge, C., Susilo, W., Fang, L., Wang, J., and Shi, Y.
(2018). A cca-secure key-policy attribute-based proxy
re-encryption in the adaptive corruption model for
dropbox data sharing system. Designs, Codes and
Cryptography, pages 1–17.
Goyal, V., Pandey, O., Sahai, A., and Waters, B. (2006).
Attribute-based encryption for fine-grained access
control of encrypted data. In The 13th ACM confe-
rence on Computer and communications security.
Herranz, J., Laguillaumie, F., and R
`
afols, C. (2010). Con-
stant size ciphertexts in threshold attribute-based en-
cryption. In International Workshop on Public Key
Cryptography, pages 19–34. Springer.
Ion, M., Russello, G., and Crispo, B. (2012). Design and
implementation of a confidentiality and access cont-
rol solution for publish/subscribe systems. Computer
networks, 56(7):2014–2037.
Jiang, Y., Susilo, W., Mu, Y., and Guo, F. (2016).
Ciphertext-policy attribute based encryption suppor-
ting access policy update. In International Conference
on Provable Security, pages 39–60. Springer.
Jiang, Y., Susilo, W., Mu, Y., and Guo, F. (2017).
Ciphertext-policy attribute-based encryption suppor-
ting access policy update and its extension with pre-
served attributes. International Journal of Information
Security, pages 1–16.
Kaaniche, N. and Laurent, M. (2017a). Attribute based en-
cryption for multi-level access control policies. In SE-
CRYPT 2017: 14th International Conference on Secu-
rity and Cryptography, volume 6, pages 67–78. Scite-
press.
Kaaniche, N. and Laurent, M. (2017b). Data security and
privacy preservation in cloud storage environments
based on cryptographic mechanisms. Computer Com-
munications, 111:120–141.
Li, J., Sha, F., Zhang, Y., Huang, X., and Shen, J. (2017).
Verifiable outsourced decryption of attribute-based
encryption with constant ciphertext length. Security
and Communication Networks, 2017.
Liang, K., Au, M. H., Liu, J. K., Susilo, W., Wong, D. S.,
Yang, G., Yu, Y., and Yang, A. (2015). A secure
and efficient ciphertext-policy attribute-based proxy
re-encryption for cloud data sharing. Future Gene-
ration Computer Systems, 52:95–108.
Nkenyereye, L., Park, Y., and Rhee, K. H. (2016). A
secure billing protocol over attribute-based encryp-
tion in vehicular cloud computing. EURASIP Jour-
nal on Wireless Communications and Networking,
2016(1):196.
Ogawa, K., Tamura, S., and Hanaoka, G. (2017). Key mana-
gement for versatile pay-tv services. In International
Workshop on Security and Trust Management, pages
3–18. Springer.
Sahai, A. and Waters, B. (2005). Fuzzy identity-based en-
cryption. In EUROCRYPT 2005.
Wang, C.-J. and Luo, J.-F. (2012). A key-policy attribute-
based encryption scheme with constant size cipher-
text. In Computational Intelligence and Security
(CIS), 2012 Eighth International Conference on, pa-
ges 447–451. IEEE.
Yao, X., Chen, Z., and Tian, Y. (2015). A lightweight
attribute-based encryption scheme for the internet
of things. Future Generation Computer Systems,
49:104–112.
SECRYPT 2018 - International Conference on Security and Cryptography
146