参考文献
[1]Chu C K,Chow S S M,Tzeng W G,et al.Key-aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage[J].IEEE Transactions on Parallel and Distributed Systems,2014,25(2):468-477.
[2]杨小东,王彩芬.基于属性群的云存储密文访问控制方案[J].计算机工程,2012,38(11):20-22,26.
[3]Sahai A,Waters B.Fuzzy Identity-based Encryp-tion[C]//Proceedings of Cryptology-EUROCRYPT’ 05.Berlin,Germany:Springer,2005:457-473.
[4]Goyal V,Pandey O,Sahai A,et al.Attribute-based Encryption for Fine-grained Access Control of Encrypted Data[C]//Proceedings of the 13th ACM Conference on Computer and Communications Security.New York,USA:ACM Press,2006:89-98.
[5]Bethencourt J,Sahai A,Waters B.Ciphertext-policy Attribute-based Encryption[C]//Proceedings of 2007 IEEE Symposium on Security and Privacy.Piscataway,USA:IEEE Press,2007:321-334.
[6]邓宇乔.基于动态属性的加密方案[J].计算机工程,2014,40(4):136-140.
[7]解理,任艳丽.隐藏访问结构的高效基于属性加密方案[J].西安电子科技大学学报,2015,42(3):97-102.
[8]Green M,Hohenberger S,Waters B.Outsourcing the Decryption of ABE Ciphertexts[C]//Proceedings of the 20th USENIX Security Symposium.Sanfrancisco,USA:USENIX Association Press,2011:1-16.
[9]Lai Junzuo,Robert D H,Guan Chaowen,et al.Attribute-based Encryption with Verifiable Outsourced Decryp-tion[J].IEEE Transactions on Information Forensics and Security,2013,8(8):1343-1354.
[10]Qin Baodong,Deng Robert H,Liu Shengli,et al.Attribute-based Encryption with Efficient Verifiable Outsourced Decryption[J].IEEE Transactions on Infor-mation Forensics and Security,2015,10(7):1384-1393.
[11]Rouselakis Y,Waters B.Practical Constructions and New Proof Methods for Large Universe Attribute-based Encryption[C]//Proceedings of ACM SIGSAC Con-ference on Computer & Communications Security.New York,USA:ACM Press,2013:463-
474.
[12]Li Jin,Huang Qiong,Chen Xiaofeng,et al.Multi-authority Ciphertext-policy Attribute-based Encryption with Accountability[C]//Proceedings of the 6th ACM Symposium on Information,Computer and Communica-tions Security.New
York,USA:ACM Press,2011:386-390.
[13]Ning Jianting,Dong Xiaolei,Cao Zhenfu,et al.White-box Traceable Ciphertext-policy Attribute-based Encryption Supporting Flexible Attributes[J].IEEE Transactions on Information Forensics and Security,2015,10(6):1274-1288.
[14]Beimel A.Secure Schemes for Secret Sharing and Key Distribution[D].Haifa,Isral:Israel Institute of Tech-nology,1996.
[15]Wang Zhiwei,Chen Feng,Xia Aidong.Attribute-based Online/Offline Encryption in Smart Grid[C]//Pro-ceedings of the 24th International Conference on Com-puter Communication and Networks.Washington D.C.,USA:IEEE Press,2015:1-5.
[16]Fan Chun,Vincent S M,Ruan Heming.Arbitrary-state Attribute-based Encryption with Dynamic Member-ship[J].IEEE Transactions on Computers,2014,63(8):1951-1961.
[17]张宇,陈晶,杜瑞颖,等.一个适用于云计算环境的高效属性加密方案[J].武汉大学学报(理学版),2015,61(4):375-383.
[18]彭开锋,张席.适应性安全且支持属性撤销的CP-ABE 方案[J].计算机工程,2015,41(4):151-155.
编辑刘冰 |