[1] |
BETHENCOURT J,SAHAI A,WATERS B.Ciphertext-policy attribute-based encryption[C]//Proceedings of IEEE Symposium on Security and Privacy.[S.1.]:IEEE Computer Society,2007:321-334.
|
[2] |
HELIL N,RAHMAN K.CP-ABE access control scheme for sensitive data set constraint with hidden access policy and constraint policy[J].Security and Communication Networks,2017(6):1-13.
|
[3] |
应作斌,马建峰,崔江涛.支持动态策略更新的半策略隐藏属性加密方案[J].通信学报,2015,36(12):178-189.
|
[4] |
HUR J.Attribute-based secure data sharing with hidden policies in smart grid[J].IEEE Transactions on Parallel and Distributed Systems,2013,24(11):2171-2180.
|
[5] |
HOHENBERGER S,WATERS B.Online/offline attribute-based encryption[C]//Proceedings of International Workshop on Public Key Cryptography.Berlin,Germany:Springer,2014:293-310.
|
[6] |
LAI Jiancheng,MU Yi,GUO Fuchuan,et al.Improved identity-based online/offline encryption[C]//Proceedings of Conference on Information Security and Privacy.Berlin,Germany:Springer,2015:247-261.
|
[7] |
LIU J K,ZHOU J.An efficient identity-based online/offline encryption scheme[M].Berlin,Germany:Springer,2009.
|
[8] |
张凯,马建峰,张俊伟,等.在线/离线的可追责属性加密方案[J].计算机研究与发展,2018,55(1):216-224.
|
[9] |
GREEN M,HOHENBERGER S,WATERS B.Outsourcing the decryption of ABE ciphertexts[C]//Proceedings of the 20th USENIX Conference on Security.[S.1.]:USENIX Association,2011:34-34.
|
[10] |
LAI Junzhuo,DENG R H,GUAN Chaowen,et al.Attributebased encryption with verifiable outsourced decryption[J].IEEE Transactions on Information Forensics and Security,2013,8(8):1343-1354.
|
[11] |
孙剑飞.基于外包的属性基密码体制应用研究[D].成都:电子科技大学,2017.
|
[12] |
MAO Xianping,LAI Junzhuo,MEI Qixiang,et al.Generic and efficient constructions of attribute-based encryption with verifiable outsourced decryption[J].IEEE Transactions on Dependable and Secure Computing,2016,13(5):533-546.
|
[13] |
LIU Hongwei,WANG Xueyuan,ZHANG Peng.Verifying outsourced decryption of CP-ABE with signature[C]//Proceedings of the 4th International Conference on Mechatronics,Materials,Chemistry and Computer Engineering.[S.1.]:Atlantis Press,2015:388-397.
|
[14] |
江泽涛,赵嘉旭,吴辉.策略隐藏的CP-ABE访问控制方案[J].计算机工程与设计,2017,38(6):1429-1433.
|
[15] |
陈成,努尔买买提·黑力力.基于CP-ABE的隐藏属性外包解密访问控制[J].计算机与现代化,2018(5):74-78.
|