[1]SAHAI A,WATERS B.Fuzzy identity based encry-ption[C]//Proceedings of the 24th Annual International Conference on Theory and Applications of Cryptographic Techniques.Berlin,Germany:Springer,2005:457-473.
[2]GOYAL V,PANDEY O,SAHAI A,et al.Attribute based encryption for fine-grained access conrol of encrypted data[C]//Proceedings of the 13th ACM Conference on Computer and Communications Security.New York,USA:ACM Press,2006:89-98.
[3]BETHENCOURT J,SAHAI A,WATERS B.Ciphertext-policy attribute-based encryption[C]//Proceedings of 2007 IEEE Symposium on Security and Privacy.Washington D.C.,USA:IEEE Computer Society,2007:321-334.
[4]CHENG Y,REN J,WANG Z,et al.Attributes union in CP-ABE algorithm for large universe cryptographic access control[C]//Proceedings of the 2nd International Conference on Cloud and Green Computing.Washington D.C.,USA:IEEE Computer Society,2012:181-185.
[5]HUR J,DONG K N.Attribute-based access control with efficient revocation in data outsourcing systems[J].IEEE Transactions on Parallel and Distributed Systems,2011,22(7):1214-1221.
[6]WAN Z G,LIU J,DENG R H.HASBE:a hierarchical attribute-based solution for flexible and scalable access control in cloud computing[J].IEEE Transactions on Information Forensics and Security,2012,7(2):743-754.
[7]HUR J,KOO D,HWANG S O,et al.Removing escrow from ciphertext policy attribute-based encryption[J].Computers and Mathematics with Applications,2013,65(9):1310-1317.
[8]王静宇,涂春岩,谭跃生,等.一种无可信第三方的密文策略属性加密方案[J].控制与决策,2015,30(9):1630-1634.
[9]HAN K,LI Q,DENG Z.Security and efficiency data sharing scheme for cloud storage[J].Chaos Solitons and Fractals,2016,86:107-116.
[10]ZHAO Q,ZHANG Y,ZHANG G,et al.Ciphertext-policy attribute based encryption supporting any monotone access structures without escrow[J].Chinese Journal of Electronics,2017,26(3):640-646.
[11]魏晓超,蒋瀚,赵川.一个高效可完全模拟的n取1茫然传输协议[J].计算机研究与发展,2016,53(11):2475-2481.
(下转第128页)
(上接第120页)
[12]葛永.若干安全多方数值计算基础协议的设计[D].合肥:安徽大学,2017.
[13]ARDEHALI M.Quantum oblivious transfer and bit commitment protocols based on two non-orthogonal states coding[J].Computer Science,2017,41(12):2445-2454.
[14]ZHANG G,LIU L,LIU Y.An attribute-based encryption scheme secure against malicious KGC[C]//Proceedings of the 11th International Conference on Trust,Security and Privacy in Computing and Communications. Washington D.C.,USA:IEEE Press,2012:1376-1380.
[15]HUR J,KOO D,HWANG S O,et al.Removing escrow from ciphertext policy attribute-based encryption[J].Computers and Mathematics with Applications,2013,65(9):1310-1317.
[16]赵圣楠,蒋瀚,魏晓超,等.一个单服务器辅助的高效n取k茫然传输协议[J].计算机研究与发展,2017,54(10):2215-2223. |