[1] BONOMI F,MILITO R,ZHU J,et al.Fog computing and its role in the Internet of Things[C]//Proceedings of MCC'12.New York,USA:ACM Press,2012:13-16. [2] OKAMOTO T,TAKASHIMA K.Decentralized attribute-based encryption and signatures[J].ICE Transactions on Fundamentals of Electronics Communications and Computer Sciences,2020,103(1):41-73. [3] MAHESWARI U S,VASANTHANAYAKI C.Secure medical health care content protection system with watermark detection for multi cloud computing environment[J].Multimedia Tools and Applications,2020,79(5):4075-4097. [4] SAHAI A,WATERS B.Fuzzy identity-based encryption[C]//Proceedings of the 24th Annual International Conference on Theory and Applications of Cryptographic Techniques.Berlin,Germany:Springer,2005:457-473. [5] POURNAGHI S M,BAYAT M,FARJAMI Y.MedSBA:a novel and secure scheme to share medical data based on blockchain technology and attribute-based encryption[J].Journal of Ambient Intelligence and Humanized Computing,2020,11(11):4613-4641. [6] GOYAL V,PANDEY O,SAHAI A,et al.Attribute-based encryption for fine-grained access control of encrypted data[C]//Proceedings of the 13th ACM Conference on Computer and Communications Security.New York,USA:ACM Press,2006:89-98. [7] BETHENCOURT J,SAHAI A,WATERS B.Ciphertext-policy attribute-based encryption[C]//Proceedings of the 28th IEEE Conference on Security and Privacy.Washington D.C.,USA:IEEE Press,2007:321-334. [8] FAN Chuni,HUANG Siming,RUAN Heming.Arbitrary-state attribute-based encryption with dynamic membership[J].IEEE Transactions on Computers,2014,63(8):1951-1961. [9] YAN Xincheng,CHEN Yue,BA Yang,et al.Updatable attribute encryption scheme supporting dynamic changes of user permissions[J].Computer Research and Development,2020,57(5):1057-1069.(in Chinese)严新成,陈越,巴阳,等.支持用户权限动态变更的可更新属性加密方案[J].计算机研究与发展,2020,57(5):1057-1069. [10] HUANG Fengming,TU Shanshan,MENG Yuan.Attribute-based encryption scheme supporting outsourcing and revocation in fog computing[J].Computer Engineering,2020,46(5):34-40.(in Chinese)黄凤鸣,涂山山,孟远.雾计算中支持外包与撤销的属性基加密方案[J].计算机工程,2020,46(5):34-40. [11] QIN Baodong,ZHENG Dong.Generic approach to outsource the decryption of attribute-based encryption in cloud computing[J].IEEE Access,2019,7:42331-42342. [12] LI Jin,ZHANG Yinghui,CHEN Xiaofeng,et al.Secure attribute-based data sharing for resource-limited users in cloud computing[J].Computers & Security,2018(72):1-12. [13] ZHOU Jun,CAO Zhenfu,DONG Xiaolei,et al.Security and privacy for cloud-based IoT:challenges[J].IEEE Communications Magazine,2017,55(1):26-33. [14] CHASE M.Multi-authority attribute based encryption[M].Berlin,Germany:Springer,2007. [15] ZHENG Lianghan,HE Heng,TONG Qian,et al.A multi-authorization organization access control scheme in cloud environment[J].Computer Science and Exploration,2020,14(11):1865-1878.(in Chinese)郑良汉,何亨,童潜,等.云环境中的多授权机构访问控制方案[J].计算机科学与探索,2020,14(11):1865-1878. [16] LI Qi,ZHU Hongbo,XIONG Jinbo,et al.An attribute-based access control scheme for traceable multi-authorization agencies in mHealth[J].Journal on Communications,2018,39(6):1-10.(in Chinese)李琦,朱洪波,熊金波,等.mHealth中可追踪多授权机构基于属性的访问控制方案[J].通信学报,2018,39(6):1-10. [17] LIU Z,JIANG Z L,WANG X,et al.Practical attribute-based encryption:outsourcing decryption,attribute revocation and policy updating[J].Journal of Network and Computer Applications,2018,108:112-123. [18] FAN Kai,LIU Tingting,ZHANG Kuan,et al.A secure and efficient outsourced computation on data sharing scheme for privacy computing[J].Journal of Parallel and Distributed Computing,2020,135:169-176. [19] XU Qian,TAN Chengxiang,FAN Zhijie,et al.Secure data access control for fog computing based on multi-authority attribute-based sign cryption with computation outsourcing and attribute revocation[J].Sensors,2018,18(5):1609-1646. [20] PENG Hongyan,LING Jiao,QIN Shaohua,et al.Attribute-based encryption scheme for edge computing[J].Computer Engineering,2021,47(1):37-43.(in Chinese)彭红艳,凌娇,覃少华,等.面向边缘计算的属性加密方案[J].计算机工程,2021,47(1):37-43. |