参考文献
[1]Sahai A,Waters B.Fuzzy Identity-based Encryption[C]//Proceedings of the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques.Berlin,Germany:Springer-Verlag,2005:457-473.
[2]Goyal V,Pandey O,Sahai A,et al.Attribute-based Encryption for Fine-grained Access Control of Encrypted Data[C]//Proceedings of the 13th ACM Conference on Computer and Communications Security.New York,USA:ACM Press,2006:89-98.
[3]Bethencourt J,Sahai A,Waters B.Ciphertext-policy Attribute-based Encryption[C]//Proceedings of IEEE Symposium on California Security and Privacy.Washington D.C.,USA:IEEE Press,2007:321-334.
[4]闫玺玺,唐永利.数据外包环境下一种支持撤销的属性基加密方案[J].通信学报,2015,36(10):92-100.
[5]杨小东,王彩芬.基于属性群的云存储密文访问控制方案[J].计算机工程,2012,38(11):20-22,26.
[6]Li Jin,Chen Xiaofeng,Li Jingwei,et al.Fine-grained Access Control System Based on Outsourced Attribute-based Encryption[C]//Proceedings of the 18th European Symposium on Research in Computer Security.Berlin,Germany:Springer-
Verlag,2013:592-609.
[7]李勇,曾振宇,张晓菲.支持属性撤销的外包解密方案[J].清华大学学报(自然科学版),2013,53(12):1964-1969.
[8]Green M,Hohenberger S,Waters B.Outsourcing the Decryption of ABE Ciphertexts[C]//Proceedings of 2011 USENIX Security Symposium.San Francisco,USA:USENIX Association,2011:1-16.
[9]Li Keying,Ma Hua.Outsourcing Decryption of Multi-authority ABE Ciphertexts[J].International Journal Network Security,2014,16(4):286-294.
[10]Lai Junzuo,Deng R H,Guan Chaowen,et al.Attribute-based Encryption with Verifiable Outsourced Decryp-tion[J].Information Forensics and Security,2013,8(8):1343-1354.
(下转第132页)
(上接第128页)
[11]Qin Baodong,Deng R H,Liu Shengli,et al.Attribute-based Encryption with Efficient Verifiable Outsourced Decryption[J].Information Forensics and Security,2013,10(7):1384-1393.
[12]Li Jingwei,Jia Chunfu,Li Jin,et al.Outsourcing Encryption of Attribute-based Encryption with MapReduce[C]//Proceedings of the 14th International Conference on Information and Communications Security.Berlin,Germany:Springer-
Verlag,2012:191-201.
[13]Li Jin,Huang Xinyin,Li Jingwei,et al.Securely Outsourcing Attribute-based Encryption with Checkabi-lity[J].Parallel and Distributed Systems,2014,25(8):2201-2210.
[14]Zhou Zhibin,Huang Dijiang.Efficient and Secure Data Storage Operations for Mobile Cloud Computing[C]//Proceedings of the 8th International Conference on Network Service Management.Laxenburg,Austria:International Federation for
Information Processing,2012:37-45.
[15]强衡畅,王晓明.一种高效细粒度云存储访问控制方案[J].计算机与数字工程,2014,42(9):1673-1677.
编辑金胡考 |