• Publications
  • Influence
A hierarchy attribute-based access control model for cloud storage
We propose a access control model to achieve fine-grainedness, data confidentiality, and scalability simultaneously by exploiting CP-ABE (Bethencourt, Sahai, and Waters, 2007) and uniquely combining it with techniques of user hierarchy and attribute hierarchy. Expand
  • 10
Cryptanalysis and improvement of a password-based key exchange protocol
In 2002, Yeh and Sun proposed a simple authenticated key agreement protocol resistant to password guessing attacks. Expand