1 |
QIN Z L X. A blockchain-based access control scheme with multiple attribute authorities for secure cloud data sharing. Journal of Systems Architecture, 2021, 112, 101854.
doi: 10.1016/j.sysarc.2020.101854
|
2 |
SHARMA P, JINDAL R, BORAH M D. Blockchain-based cloud storage system with CP-ABE-based access control and revocation process. The Journal of Supercomputing, 2022, 78 (6): 7700- 7728.
doi: 10.1007/s11227-021-04179-4
|
3 |
SAHAI A, WATERS B R. Fuzzy identity-based encryption[C]//Proceedings of the 24th Annual International Conference on Theory and Applications of Cryptographic Techniques. Berlin, Germany: Springer, 2004: 457-473.
|
4 |
GOYAL V, PANDEY O, SAHAI A, et al. Attribute-based encryption for fine-grained access control of encrypted data[C]//Proceedings of the 13th ACM Conference on Computer and Communications Security. New York, USA: ACM Press, 2006: 89-98.
|
5 |
|
6 |
LEWKO A, WATERS B. New proof methods for attribute-based encryption: achieving full security through selective techniques[EB/OL]. [2022-11-05]. https://eprint.iacr.org/2012/326.pdf.
|
7 |
SOO F T, SAMSUDIN A. Lattice ciphertext-policy attribute-based encryption from Ring-LWE[C]//Proceedings of International Symposium on Technology Management and Emerging Technologies. Washington D. C., USA: IEEE Press, 2015: 258-262.
|
8 |
LYUBASHEVSKY V, PEIKERT C, REGEV O. On ideal lattices and learning with errors over rings. Journal of the ACM, 2013, 60 (6): 1- 35.
|
9 |
张恩, 裴瑶瑶, 杜蛟. 基于RLWE的密文策略属性代理重加密. 通信学报, 2018, 39 (11): 129- 137.
doi: 10.11959/j.issn.1000-436x.2018239
|
|
ZHANG E, PEI Y Y, DU J. RLWE-based ciphertext-policy attribute proxy re-encryption. Journal on Communications, 2018, 39 (11): 129- 137.
doi: 10.11959/j.issn.1000-436x.2018239
|
10 |
闫玺玺, 刘媛, 李子臣, 等. 理想格上支持隐私保护的属性基加密方案. 通信学报, 2018, 39 (3): 128- 135.
URL
|
|
YAN X X, LIU Y, LI Z C, et al. Privacy-preserving attribute-based encryption scheme on ideal lattices. Journal on Communications, 2018, 39 (3): 128- 135.
URL
|
11 |
ZHAO S Y, JIANG R, BHARGAVA B. RL-ABE: a revocable lattice attribute based encryption scheme based on R-LWE problem in cloud storage. IEEE Transactions on Services Computing, 2022, 15 (2): 1026- 1035.
doi: 10.1109/TSC.2020.2973256
|
12 |
FELSON M, SPAETH J L. Community structure and collaborative consumption: a routine activity approach. American Behavioral Scientist, 1978, 21 (4): 614- 624.
doi: 10.1177/000276427802100411
|
13 |
XIA Q, SIFAH E, SMAHI A, et al. BBDS: blockchain-based data sharing for electronic medical records in cloud environments. Information, 2017, 8 (2): 44.
doi: 10.3390/info8020044
|
14 |
LIANG X P, ZHAO J, SHETTY S, et al. Integrating blockchain for data sharing and collaboration in mobile healthcare applications[C]//Proceedings of the 28th IEEE Annual International Symposium on Personal, Indoor, and Mobile Radio Communications. Washington D. C., USA: IEEE Press, 2018: 1-5.
|
15 |
XUAN S, ZHENG L, CHUNG I, et al. An incentive mechanism for data sharing based on blockchain with smart contracts. Computers & Electrical Engineering, 2020, 83, 106587.
|
16 |
MA X, WANG C, CHEN X. Trusted data sharing with flexible access control based on blockchain. Computer Standards & Interfaces, 2021, 78, 103543.
|
17 |
GUO Y, WANG S L, HUANG J H. A blockchain-assisted framework for secure and reliable data sharing in distributed systems. EURASIP Journal on Wireless Communications and Networking, 2021, (1): 1- 19.
|
18 |
ZHANG G F, CHEN X, FENG B, et al. BCST-APTS: blockchain and CP-ABE empowered data supervision, sharing, and privacy protection scheme for secure and trusted agricultural product traceability system. Security and Communication Networks, 2022, (22): 1- 11.
|
19 |
|
20 |
陆尧, 文捷. 基于比特币技术的供应链管控与溯源方案. 计算机工程, 2018, 44 (12): 85-93, 101.
URL
|
|
LU Y, WEN J. Scheme of supply chain control and traceability based on bitcoin technology. Computer Engineering, 2018, 44 (12): 85-93, 101.
URL
|
21 |
贾翁力, 李秀林, 刘汗青, 等. 食品溯源方法分析研究. 食品工业, 2022, 43 (10): 186- 189.
URL
|
|
JIA W L, LI X L, LIU H Q, et al. Analysis and research on food traceability method. The Food Industry, 2022, 43 (10): 186- 189.
URL
|
22 |
ZHAO H J, ZHAO B, CHENG S S. The mechanism of confirming big data property rights based on smart contract[C]//Proceedings of the 4th International Conference on Intelligent Information Technology. New York, USA: ACM Press, 2019: 78-82.
|
23 |
王海龙, 田有亮, 尹鑫. 基于区块链的大数据确权方案. 计算机科学, 2018, 45 (2): 15-19, 24.
URL
|
|
WANG H L, TIAN Y L, YIN X. Blockchain-based big data right confirmation scheme. Computer Science, 2018, 45 (2): 15-19, 24.
URL
|
24 |
|
25 |
王爱荣, 郭晓林, 何志星. 基于区块链的农产品溯源体系的演化博弈. 物流技术, 2022, 41 (1): 70- 75.
URL
|
|
WANG A R, GUO X L, HE Z X. Evolutionary game of agricultural product traceability system based on blockchain. Logistics Technology, 2022, 41 (1): 70- 75.
URL
|
26 |
LEWKO A, OKAMOTO T, SAHAI A, et al. Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption[EB/OL]. [2022-11-05]. https://eprint.iacr.org/2010/110.pdf.
|
27 |
|