[1]张玉清,王晓菲,刘雪峰.云计算环境安全综述[J].软件学报,2016,27(6):1328-1348.br/ [2]WANG M,ZHANG Z,CHEN C.Security analysis of a privacy-preserving decentralized ciphertext-policy attribute-based encryption scheme[J].Concurrency & Computation Practice & Experience,2016,28(4):1237-1245.br/ [3]XU J,WEN Q,LI W,et al.Circuit ciphertext-policy attribute-based hybrid encryption with verifiable delegation in cloud computing [J].IEEE Transactions on Parallel & Distributed Systems,2016,27(1):119-129.br/ [4]刘雪艳,郑等凤.基于素数群完全隐藏访问结构的CP-ABE方案[J].计算机工程,2016,42(10):140-145.br/ [5]WATERS B.Ciphertext-policy attribute-based encryption:an expressive,efficient,and provable secure realiza-tion[C]//Proceeding of PKC’11.Taormina,Italy:Springer,2011:53-70.br/ [6]王光波,王建华.基于属性加密的云存储方案研究[J].电子与信息学报,2016,38(11):2931-2939.br/ [7]YU S,REN K,LOU W.Attribute-based on-demand multicast group setup with membership anonymity[J].Computer Networks,2010,54(3):377-386.br/ [8]李拴全,王雪瑞.多云服务提供者环境下的一种用户密钥撤销方法[J].电子与信息学报,2015,37(9):2225-2231.br/ [9]关志涛,杨亭亭.面向云存储的基于属性加密的多授权中心访问控制方案[J].通信学报,2015,36(6):142-153.br/ [10]YANG K,JIA X.Expressive,efficient and revocable data access control for multi-authority cloud storage[J].IEEE Transactions on Parallel and Distributed Systems,2014,25(7):1735-1744.br/ [11]QIAN H,LI J.Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation[J].International Journal of Information Security,2015,14(6):487-497.br/ [12]ZHANG K,MA J.Adaptively secure multi-authority attribute-based encryption with verifiable outsourced decryption[J].China Information Sciences,2016,59(9):99-105.br/ [13]HUR J,NOH D K.Attribute-based access control with efficient revocation in data outsourcing systems[J].IEEE Transaction on Parallel & Distribute Systems,2011,22(7):1214-1221.br/ [14]杨小东,王彩芬.基于属性群的云存储密文访问控制方案[J].计算机工程,2012,38(11):20-22,26.br/ [15]DAN B,MATT F.Identity-based encryption from the weil pariring[M].Berlin,Germany:Springer,2001.br/ [16]HOHENBERGER S,WATERS B.Attribute-based encrypton with fast deceryption[C]//Proceedings of Public-key Cryptography-PKC’13.Berlin,Germany:Springer,2013:162-179.br/ |