参考文献 [ 1 ] Sahai A, Waters B. Fuzzy Identity-based Encryption [C] / / Proc. of EUROCRYPT’ 05. Berlin, Germany: Springer-Verlag,2005:237-246. [ 2 ] Goyal V, Pandey O, Sahai A, et al. Attribute-based Encryption for Fine-grained Access Control of Encrypted Data [ C ] / / Proc. of the 13th ACM Conference on Computer and Communications Security. New York, USA:ACM Press,2006:456-468. [ 3 ] Bethencourt J, Sahai A, Waters B. Ciphertext-policy Attribute-based Encryption[C] / / Proc. of the 2007 IEEE Conference on Security and Privacy. Washington D. C. , USA:IEEE Computer Society,2007:322-329. [ 4 ] Attrapadung N, Imai H. Conjunctive Broadcast and Attribute-based Encryption[C] / / Proc. of Pairing-based Cryptography-pairing Conference. Berlin, Germany: Springer-Verlag,2009:487-496. [ 5 ] Hur J,Noh D K. Attribute-based Access Control with Efficient Revocation in Data Outsourcing Systems[J]. IEEE Transactions on Parallel and Distributed Systems, 2011,22(7):1214-1221. [ 6 ] Boldyreva A, Goyal V, Kumar V. Identity-based Encryption with Efficient Revocation [ C ] / / Proc. of ACM Conference on Computer and Communications Security. New York,USA:ACM Press,2008:547-558. [ 7 ] Ibraimi L, Petkovic M, Nikova S, et al. Mediated Ciphertext-policy Attribute-based Encryption and Its Application[C] / / Proc. of the 10th Int’l Workshop on Information Security Applications. Berlin, Germany: Springer-Verlag,2009:157-166. [ 8 ] Yu Shucheng,Wang Cong. Attribute Based Data Sharing with Attribute Revocation [C] / / Proc. of ASIAN ACM Conference on Computer and Communications Security. New York,USA:ACM Press,2010:621-629. [ 9 ] Fan C,Huang V,Rung H. Arbitrary-state Attribute-based Encryption with Dynamic Membership [ J ]. IEEE Transactions on Computers,2014,68(3):1951-1961. [10] Jahid S,Mittal P,Borisov N. EASiER:Encryption-based Access Control in Social Networks with Efficient Revocation[C] / / Proc. of the 6th ACM Symposium on Information, Computer and Communications Security. New York,USA:ACM Press,2011:234-239. [11] Jahid S,Borisov N. PIRATTE:Proxy-based Immediate Revocation of ATTribute-based Encryption [ EB / OL]. (2012-08-10). http:/ / arxiv. org / pdf / 1208. 4877. pdf. [12] Naor M,Pinkas B. Efficient Trace and Revoke Schemes [ C ] / / Proc. of Financial Cryptography. Berlin, Germany:Springer,2001:366-378. 编辑 索书志 |