[1]BETHENCOURT J,SAHAI A,WATERS B.Ciphertext-policy attribute-based encryption[C]//Proceedings of 2007 IEEE Symposium on Security and Privacy.Washington D.C.,USA:IEEE Computer Society,2007:321-334.
[2]闫玺玺,孟慧.支持直接撤销的密文策略属性基加密方案[J].通信学报,2016,37(5):44-50.
[3]QIAN Huiling,LI Jiguo,ZHANG Yichen,et al.Privacy-perserving personal health record using multi-authority attribute-based encryption with revocation[J].International Journal of Information Security,2015,14(6):487-497.
[4]张星,文子龙,沈晴霓,等.可追责并解决密钥托管问题的属性基加密方案[J].计算机研究与发展,2015,52(10):2293-2303.
[5]马海英,曾国荪,陈建平,等.适应性安全的可追踪叛徒的基于属性加密方案[J].通信学报,2016,37(1):76-87.
[6]KAPADIA A,TSANG P P,SMITH S W.Attribute-based publishing with hidden credentials and hidden policies[EB/OL].[2017-06-20].https://tcipg.org/sites/default/files/papers/2007_Kapadia.pdf.
[7]LAI J Z,DENG R H,LI Y J.Expressive CP-ABE with partially hidden access structures[C]//Proceedings of the 7th ACM Symposium on Information,Computer and Communications Security.New York,USA:ACM Press,2012:18-19.
[8]应作斌,马建峰,崔江涛.支持动态策略更新的半策略隐藏属性加密方案[J].通信学报,2015,36(12):178-189.
[9]PHUONG T V X,YANG G M,SUSILO W.Hidden ciphertext policy attribute-based encryption under standard assumptions[J].IEEE Transactions on Infor-mation Forensics and Security,2016,11(1):35-45.
(下转第149页) (上接第144页) [10]YADAV U C,ALI S T.Ciphertext policy-hiding attribute-based encryption[C]//Proceeding of 2015 International Conference on Advances in Computing,Communications and Informatics.Washington D.C.,USA:IEEE Press,2015:2067-2071.
[11]HUR J.Attribute-based secure data sharing with hidden policies in smart grid[J].IEEE Transactions on Parallel and Distributed Systems,2013,24(11):2171-2180.
[12]杜瑞颖,沈剑,陈晶,等.基于策略隐藏属性加密的云访问控制方案[J].武汉大学学报(理学版),2016,62(3):242-248.
[13]宋衍,韩臻,刘凤梅,等.基于访问树的策略隐藏属性加密方案[J].通信学报,2015,36(9):119-126.
[14]XU Runhua,LANG Bo.A CP-ABE scheme with hidden policy and its application in cloud computing[C]//Proceedings of 2015 IEEE International Conference on Cloud Computing Technology and Science.Washington D.C.,USA:IEEE Press,2015:279-298.
[15]GAO A,LI Z Z.Improving user’s privacy for multi-authority ABE using privacy homomorphism[J].IEICE Transactions on Fundamentals on Electronics Commu-nications and Computer Sciences,2013,96(3):724-727.
[16]ZHONG Hong,ZHU Wenlong,XU Yan,et al.Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage[J].Soft Computing,2016,20(1):1-9.
[17]YANG Kan,JIA Xiaohua.Expressive,efficient and revocable data access control multi-authority cloud storage[J].IEEE Transactions on Parallel and Distributed Systems,2014,25(7):1735-1744.
|