参考文献
[1]SAHAI A,WATERS B.Fuzzy Identity-based Encryption[C]//Proceedings of Annual International Conference on Theory and Applications of Cryptographic Techniques.Berlin,Germany:Springer,2005:457-473.
[2]GREEN M,HOHENBERGER S,WATERS B.Outsourcing the Decryption of ABE Ciphertexts[C]//Proceedings of the 20th USENIX Conference on Security.Berkeley,USA:USENIX Association Berkeley,2011:34.
[3]LI Jin,HUANG Xinyi,LI Jingwei,et al.Securely Outsourcing Attribute-based Encryption with Checkability[J].IEEE Transactions on Parallel and Distributed Systems,2014,25(8):2201-2210.
[4]YU Shucheng,WANG Cong,REN Kui,et al.Attribute Based Data Sharing with Attribute Revocation[C]//Proceedings of the 5th ACM Symposium on Information,Computer and Communications Security.New York,USA:ACM Press,2010:261-270.
[5]HUR J,NOH D K.Attribute-based Access Control with Efficient Revocation in Data Outsourcing Systems[J].IEEE Transactions on Parallel and Distributed Systems,2011,22(7):1214-1221.
[6]HUR J.Improving Security and Efficiency in Attribute-based Data Sharing[J].IEEE Transactions on Know-ledge and Data Engineering,2013,25(10):2271-2282.
[7]YANG Kan,JIA Xiaohua.Security for Cloud Storage Systems[M].Berlin,Germany:Springer,2014.
[8]CHASE M.Multi-authority Attribute Based Encryption[C]//Proceedings of Cryptography Conference.Berlin,Germany:Springer,2007:515-534.
[9]CHASE M,CHOW S S M.Improving Privacy and Security in Multi-authority Attribute-based Encryption[C]//Proceedings of the 16th ACM Conference on Computer and Communications Security.New York,USA:ACM Press,2009:121-130.
[10]QIAN Huiling,LI Jiguo,ZHANG Yichen,et al.Privacy-preserving Personal Health Record Using Multi-authority Attribute-based Encryption with Revocation[J].Inter-national Journal of Information Security,2015,14(6):487-497.
[11]邓宇乔.基于动态属性的加密方案[J].计算机工程,2014,40(4):136-140.
[12]刘雪艳,郑等凤.基于素数群完全隐藏访问结构的CP-ABE方案[J].计算机工程2016,42(10):140-145.
[13]李勇,曾振宇,张晓菲.支持属性撤销的外包解密方案[J].清华大学学报(自然科学版),2013,53(12):1664-1669.
[14]CANETTI R,KRAWCZYK H,NIELSEN J B.Relaxing Chosen-Ciphertext Security[C]//Proceedings of Annual International Cryptology Conference.Berlin,Germany:Springer,2003:565-582.
[15]WATERS B.Ciphertext-policy Attribute-based Encryption:An Expressive,Efficient,and Provably Secure Realization[C]//Proceedings of International Workshop on Public Key Crypto-graphy.Berlin,Germany:Springer,2011:53-70.
编辑金胡考 |