[1]SAHAI A,WATERS B.Fuzzy identity-based encryption[J].Lecture Notes in Computer Science,2005,3494:457-473.br/ [2]ATTRAPADUNG N,IMAI H.Attribute-based encryption supporting direct/indirect revocation modes[C]//Proceedings of IMA International Conference on Cryptography and Coding.Berlin,Germany:Springer,2009:278-300.br/ [3]ATTRAPADUNG N,IMAI H.Conjunctive broadcast and attribute-based encryption[C]//Proceedings of the 3rd International Conference on Pairing-based Cryptography-pairing.Palo Alto,USA:IEEE Press,2009:248-265.br/ [4]王鹏翩,冯登国,张立武.一种支持完全细粒度属性撤销的CP-ABE方案[J].软件学报,2012,23(10):2805-2816.br/ [5]PIRRETTI M,TRAYNOR P,MCDANIEL P,et al.Secure attribute-based systems[J].Journal of Computer Security,2010,18(5):799-837.br/ [6]BETHENCOUIT J,SAHAI A,WATERS B.Ciphertext-policy attribute-based encryption[C]//Proceedings of IEEE Symposium on Security and Privacy.Washington D.C.,USA:IEEE Computer Society,2007:321-334.br/ [7]LUAN I,PETKOVIC M,NIKOVA S,et al.Mediated ciphertext-policy attribute-based encryption and its appli-cation[C]//Proceedings of International Workshop on Information Security Applications.Busan,South Korea:[s.n.],2009:309-323.br/ [8]HUR J,NOH D K.Attribute-based access control with efficient revocation in data outsourcing systems[J].IEEE Transactions on Parallel & Distributed Systems,2011,22(7):1214-1221.br/ [9]杨小东,王彩芬.基于属性群的云存储密文访问控制方案[J].计算机工程,2012,38(11):20-22,26.br/ [10]DI P R,MANCIANI L V,JAJODIA S.Efficient and secure keys management forwireless mobile commiinications[C]//Proceedings of the 2nd ACM International Workshop on Principles of Mobile Computing.Toulouse,France:[s.n.],2002:66-73.br/ [11]IBRAIMI L,TANG Q,HARTEL P,et al.Efficient and provable secure ciphertext-policy attribute-based encryption schemes[C]//Proceedings of International Conference on Information Security Practice and Experience.Xi’an,China:[s.n.],2009:1-12.br/ [12]闫玺玺,汤永利.数据外包环境下一种支持撤销的属性基加密方案[J].通信学报,2015,36(10):92-100.br/ [13]闫玺玺,孟慧.支持直接撤销的密文策略属性基加密方案[J].通信学报,2016,37(5):44-50.br/ [14]韩司.基于云存储的数据安全共享关键技术研究[D].北京:北京邮电大学,2015.br/ [15]BANIHASHEMIAN S,BAFGHI A G.Centralized key management scheme in wireless sensor networks[J].Wireless Personal Communications,2011,60(3):463-474.br/ [16]LIU Y N,JIAN W,HE D,et al.Intra-cluster key sharing in hierarchical sensor networks[J].IET Wireless Sensor Systems,2013,3(3):172-182.br/ [17]JOLLY G,et al.A low-energy key management protocol for wireless sensor networks[C]//Proceedings of the 8th IEEE International Symposium on Computers and Communication.Hong Kong,China:IEEE Computer Society,2003:335-340.br/ [18]BETHENCOURT J,SAHAI A.Advanced crypto software collection:the cpabe toolkit[EB/OL].[2017-04-01].http://acsc.cs.utexas.edu/cpabe/.br/ |