参考文献
[1]Sahai A,Waters B.Fuzzy Identity-based Encryption[C]//Proceedings of EUROCRYPT’05.Berlin,Germany:Springer,2005:457-473.
[2]Goyal V,Pandey O,Sahai A,et al.Attribute-based Encryption for Fine-grained Access Control of Encrypted Data[C]//Proceedings of ACMCCS’06.New York,USA:ACM Press,2006:89-98.
[3]Bethencourt J,Sahai A,Waters B.Ciphertext-policy Attribute-based Encryption[C]//Proceedings of 2007 IEEE Symposium on Security and Privacy.Washington D.C.,USA:IEEE Computer Society,2007:321-334.
[4]Luan I,Qiang Tang,Hartel P,et al.Efficient and Provable Secure Ciphertext-policy Attribute-based En-cryption Schemes[M]//Bao Feng,Li Hui,Wang Guilin.Information Security Practice and Experience.Berlin,Germany:Springer,2009:1-12.
[5]刘西蒙,马建峰,熊金波,等.密文策略的权重属性基加密方案[J].西安交通大学学报,2013,47(8):44-48.
[6]Balu A,Kuppusamy K.An Expressive and Provably Secure Ciphertext-policy Attribute-based Encryption[J].Information Sciences,2014,276(4):354-362.
[7]Deng Hua,Wu Qianhong,Qin Bo,et al.Ciphertext-policy Hierarchical Attribute-based Encryption with Short Ciphertexts[J].Information Sciences,2014,275(11):370-384.
[8]Nishide T,Yoneyama K,Ohta K.Attribute-based Encryption with Partially Hidden Encryptor-specified Access Structures[M]//Bellovin S M,Gennaro R,Keromytis A,et al.Applied Cryptography and Network
Security.Berlin,Germany:Springer,2008:111-129.
[9]Yu Shucheng,Ren Kui,Lou Wenjing.Attribute-based Content Distribution with Hidden Policy[C]//Pro-ceedings of the 4th Workshop on Secure Network Protocols.Washington D.C.,USA:IEEE Press,2008:39-44.
[10]Lai Juncheng,Deng R H,Li Yingjiu.Fully Secure Cipertext-policy Hiding CP-ABE[M]//Bao Feng,Weng Jian.Information Security Practice and Experience.Berlin,Germany:Springer,2011:24-39.
[11]Sascha M,Stefan K.Hidding the Policy in Cryptographic Access Control[C]//Proceedings of International Con-ference on Security & Trust Management.Washington D.C.,USA:IEEE Press,2012:90-105.
[12]Koo D,Yoon H,Hur J.Secure and Efficient Data Retrieval over Encrypted Data Using Attribute-based Encryption in Cloud Storage[J].Computers & Electrical Engineering,2013,39(1):34-46.
[13]王海斌,陈少真.隐藏访问结构的基于属性加密方案[J].电子与信息学报,2012,34(2):457-461.
[14]解理,任艳丽.隐藏访问结构的高效基于属性加密方案[J].西安电子科技大学学报,2015,42(3):97-102.
[15]Dan B,Boyen X,Shacham H.Short Group Signatures[M]//Franklin M.Advances in Cryptology-CRYPTO 2004.Berlin,Germany:Springer,2004:41-55.
[16]Shoup V.Sequences of Games:A Tool for Taming Complexity in Security Proofs[EB/OL].[2015-11-25].http://www.shoup.net.
编辑金胡考 |