参考文献
[1]Sahai A,Waters B.Fuzzy Identity-based Encryption[C]//Proceedings of Cryptology-EUROCRYPT’05.Berlin,Germany:Springer-Verlag,2005:457-473.
[2]Goyal V,Pandey O,Sahai A,et al.Attribute-based Encryption for Fine-grained Access Control of Encrypted Data[C]//Proceedings of the 13th ACM Conference on Computer and Communications Security.New York,USA:ACM Press,2006:89-98.
[3]Bethencourt J,Sahai A,Waters B.Ciphertext-policy Attribute-based Encryption[C]//Proceedings of 2007 IEEE Symposium on Security and Privacy.Washington D.C.,USA:IEEE Computer Society,2007:321-334.
[4]邓宇乔.基于动态属性的加密方案[J].计算机工程,2014,40(4):136-140.
[5]林娟,薛庆水,曹珍富.基于代理的即时属性撤销KP-ABE方案[J].计算机工程,2014,40(10):20-24.
[6]冯登国,陈成.属性密码学研究[J].密码学报,2014,1(1):1-12.
[7]Chase M.Multi-authority Attribute Based Encryp-tion[C]//Proceedings of TCC’07.Berlin,Germany:Springer-Verlag,2007:515-534.
[8]Chase M,Chow S S M.Improving Privacy and Security in Multi-authority Attribute-based Encryption[C]//Proceedings of ACM Conference on Computer and Communications Security.New York,USA:ACM Press,2009:121-130.
[9]Müller S,Katzenbeisser S,Eckert C.Distributed Attribute-based Encryption[C]//Proceedings of ICISC’08.Berlin,Germany:Springer-Verlag,2008:20-36.
[10]Müller S,Katzenbeisser S,Eckert C.On Multi-authority Ciphertext-policy Attribute-based Encryption[J].Bulletin of the Korean Mathematical Society,2009,46(4):803-819.
[11]陈丹伟,邵菊,樊晓唯,等.基于MAH-ABE的云计算隐私保护访问控制[J].电子学报,2014,42(4):821-827.
[12]Waters B.Dual System Encryption:Realizing Fully Secure IBE and HIBE Under Simple Assumptions[C]//Proceedings of Cryptology-CRYPTO’09.Berlin,Germany:Springer-Verlag,2009:619-636.
[13]Lewko A,Waters B.Decentralizing Attribute-based Encryp-tion[C]//Proceedings of Cryptology-EUROCRYPT’11.Berlin,Germany:Springer-Verlag,2011:568-588.
[14]Liu Zhen,Cao Zhenfu,Huang Qiong,et al.Fully Secure Multi-authority Ciphertext-policy Attribute-based Encryp-tion without Random Oracles[C]//Proceedings of Computer Security-ESORICS’11.Berlin,Germany:Springer-Verlag,2011:278-297.
[15]Waters B.Ciphertext-policy Attribute-based Encryption:An Expressive,Efficient,and Provably Secure Realiza-tion[C]//Proceedings of the PKC’11.Berlin,Germany:Springer-Verlag,2011:53-70.
[16]Lewko A,Waters B.New Proof Methods for Attribute-based Encryption:Achieving Full Security through Selective Techniques[C]//Proceedings of Cryptology-CRYPTO’12.Berlin,Germany:Springer-Verlag,2012:180-198.
[17]Boneh D,Goh E J,Nissim K.Evaluating 2-DNF Formulas on Ciphertexts[M].Berlin,Germany:Springer-Verlag,2005.
[18]Beimel A.Secure Schemes for Secret Sharing and Key Distribution[D].Haifa,Israel:Israel Institute of Tech-nology,1996.
[19]Lewko A.Tools for Simulating Features of Composite Order Bilinear Groups in the Prime Order Setting[C]//Proceedings of Cryptology-EUROCRYPT’12.Berlin,Germany:Springer-Verlag,2012:318-335.
编辑陆燕菲 |