参考文献
[1]Benaloh J,Chase M,Horvitz E,et al.Patient Controlled Encryption:Ensuring Privacy of Electronic Medical Records[C]//Proceedings of 2009 ACM Workshop on Cloud Computing Security.New York,USA:ACM Press,2009:103-114.
[2]Atallah M J,Blanton M,Fazio N,et al.Dynamic and Efficient Key Management for Access Hierarchies[J].ACM Transactions on Information and System Security,2009,12(3):1-43.
[3]Goyal V,Pandey O,Sahai A,et al.Attribute-based Encryption for Fine-grained Access Control of Encrypted Data[C]//Proceedings of the 13th ACM Conference on Computer and Communications Security.New York,USA:ACM Press,2006:89-98.
[4]Guo Fuchun,Mu Yi,Chen Zhide.Identity-based Encryption:How to Decrypt Multiple Ciphertexts Using a Single Decryption Key[M]//Takagi T,Okamoto T,Okamoto E.Pairing-based Cryptography-pairing.Berlin,Germany:Springer,2007:392-406.
[5]Guo Fuchun,Mu Yi,Chen Zhide,et al.Multi-identity Single-key Decryption Without Random Oracles[C]//Proceedings of INSCRYPT’08.Berlin,Germany:Springer,2008:384-398.
[6]明洋,王育民,庞辽军.标准模型下可证安全的多身份单密钥解密方案[J].计算机科学,2010,37(3):73-75.
[7]Wu Chunying,Li Shundong,Zhang Yiying.Key Manage-ment Scheme Based on Secret Sharing for Wireless Sensor Networks[J].International Journal of Information and Communication Technology,2015,7(2/3):126-140.
[8]Pais A R,Joshi S.A New Probabilistic Rekeying Method for Secure Multicast Groups[J].International Journal of Information Security,2010,9(4):275-286.
(下转第44页)
(上接第37页)
[9]Chu C K,Chow S S M,Tzeng W G,et al.Key-aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage[J].IEEE Transactions on Parallel and Distributed Systems,2014,25(2):468-477.
[10]Boneh D,Waters B,Zhandry M.Low Overhead Broadcast Encryption from Multilinear Maps[C]//Proceedings of Cryptology-CRYPTO’14.Berlin,Germany:Springer,2014:206-223.
[11]Boneh D,Silverberg A.Applications of Multilinear Forms to Cryptography[J].Contemporary Mathematics,2003,324:71-90.
[12]Garg S,Gentry C,Halevi S.Candidate Multilinear Maps from Ideal Lattices[C]//Proceedings of Cryptology-EUROCRYPT’13.Berlin,Germany:Springer,2013:1-17.
[13]Kate K,Potdukhe S D.Data Sharing in Cloud Storage with Key-aggregate Cryptosystem[J].International Journal of Engineering Research and General Science,2014,2(6):882-886.
[14]赖俊祚.可证安全的公钥加密和无证书公钥加密的研究[D].上海:上海交通大学,2009.
[15]杨坤伟,李顺东.一种基于身份的匿名广播加密方案[J].计算机工程,2014,40(7):97-101.
[16]Canetti R,Halevi S,Katz J.Chosen-ciphertext Security from Identity-based Encryption[C]//Proceedings of Cryptology-Eurocrypt’04.Berlin,Germany:Springer,2004:207-222.
编辑陆燕菲 |