1 |
FERRAIOLO D F, CUGINI J, KUHN D R. Role-Based Access Control (RBAC): features and motivations[C]//Proceedings of the 11th Annual Computer Security Application Conference. Washington D.C., USA: IEEE Press, 1995: 241-248.
|
2 |
KUHN D R , COYNE E J , WEIL T R . Adding attributes to role-based access control. Computer, 2010, 43 (6): 79- 81.
|
3 |
GOYAL V, PANDEY O, SAHAI A, et al. Attribute-based encryption for fine-grained access control of encrypted data[C]//Proceedings of the 13th ACM Conference on Computer and Communications Security. New York, USA: ACM Press, 2006: 89-98.
|
4 |
JIANG R , KANG Y J , LIU Y S , et al. A trust transitivity model of small and medium-sized manufacturing enterprises under blockchain-based supply chain finance. International Journal of Production Economics, 2022, 247, 108469.
doi: 10.1016/j.ijpe.2022.108469
|
5 |
DU M X , CHEN Q J , XIAO J , et al. Supply chain finance innovation using blockchain. IEEE Transactions on Engineering Management, 2020, 67 (4): 1045- 1058.
doi: 10.1109/TEM.2020.2971858
|
6 |
CHEN Y W , MENG L H , ZHOU H , et al. A blockchain-based medical data sharing mechanism with attribute-based access control and privacy protection. Wireless Communications and Mobile Computing, 2021 (1): 1- 12.
|
7 |
QIAN H L , LI J G , ZHANG Y C , et al. Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation. International Journal of Information Security, 2015, 14 (6): 487- 497.
doi: 10.1007/s10207-014-0270-9
|
8 |
LI J G , ZHANG Y C , NING J T , et al. Attribute based encryption with privacy protection and accountability for CloudIoT. IEEE Transactions on Cloud Computing, 2022, 10 (2): 762- 773.
doi: 10.1109/TCC.2020.2975184
|
9 |
YANG K , JIA X H . Expressive, efficient, and revocable data access control for multi-authority cloud storage. IEEE Transactions on Parallel and Distributed Systems, 2014, 25 (7): 1735- 1744.
doi: 10.1109/TPDS.2013.253
|
10 |
|
11 |
ZHANG L Y , REN J , MU Y , et al. Privacy-preserving multi-authority attribute-based data sharing framework for smart grid. IEEE Access, 2020, 8, 23294- 23307.
doi: 10.1109/ACCESS.2020.2970272
|
12 |
SAHAI A, WATERS B. Fuzzy identity-based encryption[C]//Proceedings of the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Berlin, Germany: Springer, 2005: 457-473.
|
13 |
LEWKO A, WATERS B. Decentralizing attribute-based encryption[C]//Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques. Berlin, Germany: Springer, 2011: 568-588.
|
14 |
LIU S H , YU J G , HU C Q , et al. Traceable multiauthority attribute-based encryption with outsourced decryption and hidden policy for CIoT. Wireless Communications and Mobile Computing, 2021 (1): 1- 16.
URL
|
15 |
段亚红, 王峥, 赵涓涓, 等. 雾计算中支持解密外包的可验证属性加密方案. 计算机工程与科学, 2023, 45 (3): 443- 452.
doi: 10.3969/j.issn.1007-130X.2023.03.009
|
|
DUAN Y H , WANG Z , ZHAO J J , et al. A verifiable attribute encryption scheme supporting decryption outsourcing in fog computing. Computer Engineering & Science, 2023, 45 (3): 443- 452.
doi: 10.3969/j.issn.1007-130X.2023.03.009
|
16 |
方子旋, 曹素珍, 闫俊鉴, 等. 智慧医疗环境下白盒可追溯的CP-ABE方案. 计算机工程, 2023, 49 (3): 142- 150.
doi: 10.19678/j.issn.1000-3428.0065713
|
|
FANG Z X , CAO S Z , YAN J J , et al. White-box traceable CP-ABE scheme in smart healthcare environment. Computer Engineering, 2023, 49 (3): 142- 150.
doi: 10.19678/j.issn.1000-3428.0065713
|
17 |
ZIEGLER D, MARSALEK A, PALFINGER G. White-box traceable attribute-based encryption with hidden policies and outsourced decryption[C]//Proceedings of the IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). Washington D.C., USA: IEEE Press, 2021: 331-338.
|
18 |
LI Y, ZHANG Q Y, CHENG J, et al. Attribute-based verifiable outsourcing decryption encryption scheme in IIoT[C]//Proceedings of the International Conference on Networking and Network Applications (NaNA). Washington D.C., USA: IEEE Press, 2023: 332-338.
|
19 |
郭瑞, 魏鑫, 陈丽. 工业物联网环境下可外包的策略隐藏属性基加密方案. 信息网络安全, 2023, 23 (3): 1- 12.
URL
|
|
GUO R , WEI X , CHEN L . An outsourceable and policy-hidden attribute-based encryption scheme in the IIoT system. Netinfo Security, 2023, 23 (3): 1- 12.
URL
|
20 |
BODKHE U , TANWAR S , PAREKH K , et al. Blockchain for industry 4.0: a comprehensive review. IEEE Access, 2020, 8, 79764- 79800.
doi: 10.1109/ACCESS.2020.2988579
|
21 |
SEDLMEIR J , SMETHURST R , RIEGER A , et al. Digital identities and verifiable credentials. Business & Information Systems Engineering, 2021, 63 (5): 603- 613.
URL
|
22 |
|
23 |
DAN B . The decision Diffie-Hellman problem. Berlin, Germany: Springer, 1998.
|
24 |
BONEH D , BOYEN X . Short signatures without random oracles and the SDH assumption in bilinear groups. Journal of Cryptology, 2008, 21 (2): 149- 177.
doi: 10.1007/s00145-007-9005-7
|