[1] 黄穗, 陈丽炜, 范冰冰.基于CP-ABE和区块链的数据安全共享方法[J].计算机系统应用, 2019, 28(11):79-86. HUANG S, CHEN L W, FAN B B.Data security sharing method based on CP-ABE and blockchain[J].Computer Systems & Applications, 2019, 28(11):79-86.(in Chinese) [2] 王秀利, 江晓舟, 李洋.应用区块链的数据访问控制与共享模型[J].软件学报, 2019, 30(6):1661-1669. WANG X L, JIANG X Z, LI Y.Model for data access control and sharing based on blockchain[J].Journal of Software, 2019, 30(6):1661-1669.(in Chinese). [3] 杨亚涛, 蔡居良, 张筱薇, 等.基于SM9算法可证明安全的区块链隐私保护方案[J].软件学报, 2019, 30(6):1692-1704. YANG Y T, CAI J L, ZHANG X W, et al.Privacy preserving scheme in block chain with provably secure based on SM9 algorithm[J].Journal of Software, 2019, 30(6):1692-1704.(in Chinese) [4] 田有亮, 杨科迪, 王缵, 等.基于属性基加密的区块链数据溯源算法[J].通信学报, 2019, 40(11):101-111. TIAN Y L, YANG K D, WANG Z, et al.Algorithm of blockchain data provenance based on ABE[J].Journal on Communications, 2019, 40(11):101-111.(in Chinese) [5] FAN Y K, LIN X D, LIANG W, et al.TraceChain:a blockchain-based scheme to protect data confidentiality and traceability[J].Software:Practice and Experience, 2022, 52(1):115-129. [6] WANG H, SONG Y J.Secure cloud-based EHR system using attribute-based cryptosystem and blockchain[J].Journal of Medical Systems, 2018, 42(8):152. [7] ZHANG Y R, HE D B, CHOO K K R.BaDS:blockchain-based architecture for data sharing with ABS and CP-ABE in IoT[J].Wireless Communications and Mobile Computing, 2018, 18:1-9. [8] SAHAI A, WATERS B.Fuzzy identity-based encryption[C]//Proceedings of Annual International Conference on Theory and Applications of Cryptographic Techniques.Berlin, Germany:Springer, 2005:457-473. [9] GOYAL V, PANDEY O, SAHAI A, et al.Attribute-based encryption for fine-grained access control of encrypted data[C]//Proceedings of the 13th ACM Conference on Computer and Communications Security.New York, USA:ACM Press, 2006:89-98. [10] WATERS B.Ciphertext-policy attribute-based encryption:an expressive, efficient and provable secure realization[C]//Proceedings of the 14th International Conference on Practice and Theory in Public Key Cryptography.Washington D.C., USA:IEEE Press, 2011:53-70. [11] 王悦, 樊凯.隐藏访问策略的高效CP-ABE方案[J].计算机研究与发展, 2019, 56(10):2151-2159. WANG Y, FAN K.Effective CP-ABE with hidden access policy[J].Journal of Computer Research and Development, 2019, 56(10):2151-2159.(in Chinese) [12] ZHOU Z, HUANG D, WANG Z.Efficient privacy-preserving ciphertext-policy attribute based-encryption and broadcast encryption[J].IEEE Transactions on Computers, 2015, 64(1):126-138. [13] YANGLI C, LINGLING S, GNEG Y.Attribute-based access control for multi-authority systems with constant size ciphertext in clouds[J].China Communications, 2016, 13(2):146-162. [14] PHUONG T V X, YANG G M, SUSILO W.Hidden ciphertext policy attribute-based encryption under standard assumptions[J].IEEE Transactions on Information Forensics and Security, 2016, 11(1):35-45. [15] RUJ S, STOJMENOVIC M, NAYAK A.Decentralized access control with anonymous authentication of data stored in clouds[J].IEEE Transactions on Parallel and Distributed Systems, 2014, 25(2):384-394. [16] BETHENCOURT J, SAHAI A, WATERS B.Ciphertext-policy attribute-based encryption[C]//Proceedings of 2007 IEEE Symposium on Security and Privacy.Washington D.C., USA:IEEE Press, 2007:321-334. [17] OKAMOTO T, TAKASHIMA K.Fully secure unbounded inner-product and attribute-based encryption[C]//Proceedings of Advances in Cryptology-ASIACRYPTʼ12.Washington D.C., USA:IEEE Press, 2012:349-366. [18] GORBUNOV S, VAIKUNTANATHAN V, WEE H.Attribute-based encryption for circuits[C]//Proceedings of the 45th Annual ACM Symposium on Theory of Computing.New York, USA:ACM Press, 2013:545-554. [19] HOHENBERGER S, WATERS B.Online/offline attribute-based encryption[C]//Proceedings of International Conference on Theory and Application of Cryptology.New York, USA:ACM Press, 2014:293-310. [20] ROUSELAKIS Y, WATERS B.Practical constructions and new proof methods for large universe attribute-based encryption[C]//Proceedings of 2013 ACM SIGSAC Conference on Computer & Communications Security.New York, USA:ACM Press, 2013:463-474. [21] AJTAI M.Generating hard instances of lattice problems[C]//Proceedings of STOCʼ96.Washington D.C., USA:IEEE Press, 1996:99-108. [22] REGEV O.On lattices, learning with errors, random linear-codes, and cryptography[J].Journal of the ACM, 2009, 48(5):1-40. [23] 钱心缘, 吴文渊.基于R-SIS和R-LWE构建的IBE加密方案[J].计算机科学, 2021, 48(6):315-323. QIAN X Y, WU W Y.Identity-based encryption scheme based on R-SIS/R-LWE[J].Computer Science, 2021, 48(6):315-323.(in Chinese) [24] 周艺华, 董松寿, 杨宇光.标准模型下基于格的身份代理部分盲签名方案[J].信息网络安全, 2021, 21(3):37-43. ZHOU Y H, DONG S S, YANG Y G.A lattice-based identity-based proxy partially blind signature scheme in the standard model[J].Netinfo Security, 2021, 21(3):37-43.(in Chinese) [25] 张彦华, 胡予濮, 刘西蒙, 等.格上本地验证者撤销属性基群签名的零知识证明[J].电子与信息学报, 2020, 42(2):315-321. ZHANG Y H, HU Y P, LIU X M, et al.Zero-knowledge proofs for attribute-based group signatures with verifier-local revocation over lattices[J].Journal of Electronics & Information Technology, 2020, 42(2):315-321.(in Chinese). [26] DATTA P, KOMARGODSKI I, WATERS B.Decentralized multi-authority abe for DNFs from LWE[C]//Proceedings of Advances in Cryptology-EUROCRYPTʼ21.Washington D.C., USA:IEEE Press, 2021:145-158. |