参考文献
[1]SAHAI A,WATERS B.Fuzzy Identity-based Encryption[C]//Proceedings of International Conference on Theory & Applications of Cryptographic Techniques.Berlin,Germany:Springer,2005:457-473.
[2]GOYAL V,PANDEY O,SAHAI A,et al.Attribute-based Encryption for Fine-grained Access Control of Encrypted Data[C]//Proceeding of the 13th ACM Conference on Computer and Communications Security.New York,USA:ACM Press,2006:89-98.
[3]WATERS B.Ciphertext-policy Attribute-based Encryption:An Expressive,Efficient,and Provably Secure Realiza-tion[C]//Proceedings of International Workshop on Public Key Cryptography.Berlin,Germany:Springer,2011:53-70.
[4]LIU Zhen,CAO Zhenfu,WONG D S.Black-box Traceable CP-ABE:How to Catch People Leaking Their Keys by Selling Decryption Devices on eBay[C]// Proceedings of ACM SIGSAC Conference on Computer and Communications Security.New York,USA:ACM Press,2013:475-486.
[5]LIU Zhen,CAO Zhenfu,WONG D S.White-box Traceable Ciphertext-policy Attribute-based Encryption Supporting Any Monotone Access Structures[J].IEEE Transations on Information Forensics and Security,2013,8(1):76-88.
[6]马华,白翠翠,李宾,等.支持属性撤销和解密外包的属性基加密方案[J].西安电子科技大学学报(自然科学版),2015,42(6):6-10.
[7]阎玺玺,孟慧.支持直接撤销的密文策略属性基加密方案[J].通信学报,2016,37(5):44-50.
[8]LAI Junzuo,DENG R H,LIYingjiu.Expressive CP-ABE with Partially Hidden Access Structures[C]//Proceedings of the 7th ACM Symposium on Information,Computer and Communications Security.New York,USA:ACM Press,2012:18-19.
[9]应作斌,马建峰,崔江涛.支持动态策略更新的半策略隐藏属性加密方案[J].通信学报,2015,36(12):178-189.
[10]PHUONG T V X,YANG Guomin,SUSILO W.Hidden Ciphertext Policy Attribute-based Encryption Under Standard Assumptions[J].IEEE Transactions on Infor-mation Forensics and Security,2015,11(1):1-1.
[11]YADAV U C,ALI S T.Ciphertext Policy-hiding Attribute-based Encryption[C]//Proceedings of International Con-ference on Advances in Computing.Washington D.C.,USA:IEEE Press,2015:2067-2071.
[12]ZHOU Zhibin,HUANG Dijiang,WANG Zhijie.Efficient Privacy-preserving Ciphertext-policy Attribute Based Encryption and Broadcast Encryption[J].IEEE Transactions on Computers,2015,64(1):126-138.
[13]HUR J.Attribute-based Secure Data Sharing with Hidden Policies in Smart Grid[J].IEEE Transactions on Parallel and Distributed Systems,2013,24(11):2171-2180.
[14]杜瑞颖,沈剑,陈晶,等.基于策略隐藏属性加密的云访问控制方案[J].武汉大学学报(理学版),2016,62(3):242-248.
[15]宋衍,韩臻,刘凤梅,等.基于访问树的策略隐藏属性加密方案[J].通信学报,2015,36(9):119-126.
[16]XU Runhua,LANG Bo.A CP-ABE Scheme with Hidden Policy and Its Application in Cloud Com-puting[J].International Journal of Cloud Computing,2015,4(4):279-298.
[17]GAO Ang,LI Zengzhi.Improving User’s Privacy for Multi-authority ABE Using Privacy Homomorphism[J].IEICE Transactions on Fundamentals on Electronics Communications and Computer Sciences,2013,96(3):724-727.
[18]ZHONG Hong,ZHU Wenlong,XU Yan,et al.Multi-authority Attribute-based Encryption Access Control Scheme with Policy Hidden for Cloud Storage[J].Soft Computing,2016,17(7):1-9.
[19]YANG Kan,JIA Xiaohua.Expressive,Efficient and Revocable Data Access Control Multi-authority Cloud Storage[J].IEEE Transactions on Parallel and Distributed Systems,2014,25(7):1735-1744.
编辑顾逸斐 |