| 1 | FERRAIOLO D F, CUGINI J, KUHN D R. Role-Based Access Control (RBAC): features and motivations[C]//Proceedings of the 11th Annual Computer Security Application Conference. Washington D.C., USA: IEEE Press, 1995: 241-248. | 
																													
																						| 2 |  KUHN D R ,  COYNE E J ,  WEIL T R .  Adding attributes to role-based access control. Computer, 2010, 43 (6): 79- 81. | 
																													
																						| 3 | GOYAL V, PANDEY O, SAHAI A, et al. Attribute-based encryption for fine-grained access control of encrypted data[C]//Proceedings of the 13th ACM Conference on Computer and Communications Security. New York, USA: ACM Press, 2006: 89-98. | 
																													
																						| 4 |  JIANG R ,  KANG Y J ,  LIU Y S , et al.  A trust transitivity model of small and medium-sized manufacturing enterprises under blockchain-based supply chain finance. International Journal of Production Economics, 2022, 247, 108469.  doi: 10.1016/j.ijpe.2022.108469
 | 
																													
																						| 5 |  DU M X ,  CHEN Q J ,  XIAO J , et al.  Supply chain finance innovation using blockchain. IEEE Transactions on Engineering Management, 2020, 67 (4): 1045- 1058.  doi: 10.1109/TEM.2020.2971858
 | 
																													
																						| 6 |  CHEN Y W ,  MENG L H ,  ZHOU H , et al.  A blockchain-based medical data sharing mechanism with attribute-based access control and privacy protection. Wireless Communications and Mobile Computing, 2021 (1): 1- 12. | 
																													
																						| 7 |  QIAN H L ,  LI J G ,  ZHANG Y C , et al.  Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation. International Journal of Information Security, 2015, 14 (6): 487- 497.  doi: 10.1007/s10207-014-0270-9
 | 
																													
																						| 8 |  LI J G ,  ZHANG Y C ,  NING J T , et al.  Attribute based encryption with privacy protection and accountability for CloudIoT. IEEE Transactions on Cloud Computing, 2022, 10 (2): 762- 773.  doi: 10.1109/TCC.2020.2975184
 | 
																													
																						| 9 |  YANG K ,  JIA X H .  Expressive, efficient, and revocable data access control for multi-authority cloud storage. IEEE Transactions on Parallel and Distributed Systems, 2014, 25 (7): 1735- 1744.  doi: 10.1109/TPDS.2013.253
 | 
																													
																						| 10 |  | 
																													
																						| 11 |  ZHANG L Y ,  REN J ,  MU Y , et al.  Privacy-preserving multi-authority attribute-based data sharing framework for smart grid. IEEE Access, 2020, 8, 23294- 23307.  doi: 10.1109/ACCESS.2020.2970272
 | 
																													
																						| 12 | SAHAI A, WATERS B. Fuzzy identity-based encryption[C]//Proceedings of the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Berlin, Germany: Springer, 2005: 457-473. | 
																													
																						| 13 | LEWKO A, WATERS B. Decentralizing attribute-based encryption[C]//Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques. Berlin, Germany: Springer, 2011: 568-588. | 
																													
																						| 14 |  LIU S H ,  YU J G ,  HU C Q , et al.  Traceable multiauthority attribute-based encryption with outsourced decryption and hidden policy for CIoT. Wireless Communications and Mobile Computing, 2021 (1): 1- 16.  URL
 | 
																													
																						| 15 | 段亚红, 王峥, 赵涓涓, 等.  雾计算中支持解密外包的可验证属性加密方案. 计算机工程与科学, 2023, 45 (3): 443- 452.  doi: 10.3969/j.issn.1007-130X.2023.03.009
 | 
																													
																						|  |  DUAN Y H ,  WANG Z ,  ZHAO J J , et al.  A verifiable attribute encryption scheme supporting decryption outsourcing in fog computing. Computer Engineering & Science, 2023, 45 (3): 443- 452.  doi: 10.3969/j.issn.1007-130X.2023.03.009
 | 
																													
																						| 16 | 方子旋, 曹素珍, 闫俊鉴, 等.  智慧医疗环境下白盒可追溯的CP-ABE方案. 计算机工程, 2023, 49 (3): 142- 150.  doi: 10.19678/j.issn.1000-3428.0065713
 | 
																													
																						|  |  FANG Z X ,  CAO S Z ,  YAN J J , et al.  White-box traceable CP-ABE scheme in smart healthcare environment. Computer Engineering, 2023, 49 (3): 142- 150.  doi: 10.19678/j.issn.1000-3428.0065713
 | 
																													
																						| 17 | ZIEGLER D, MARSALEK A, PALFINGER G. White-box traceable attribute-based encryption with hidden policies and outsourced decryption[C]//Proceedings of the IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). Washington D.C., USA: IEEE Press, 2021: 331-338. | 
																													
																						| 18 | LI Y, ZHANG Q Y, CHENG J, et al. Attribute-based verifiable outsourcing decryption encryption scheme in IIoT[C]//Proceedings of the International Conference on Networking and Network Applications (NaNA). Washington D.C., USA: IEEE Press, 2023: 332-338. | 
																													
																						| 19 | 郭瑞, 魏鑫, 陈丽.  工业物联网环境下可外包的策略隐藏属性基加密方案. 信息网络安全, 2023, 23 (3): 1- 12.  URL
 | 
																													
																						|  |  GUO R ,  WEI X ,  CHEN L .  An outsourceable and policy-hidden attribute-based encryption scheme in the IIoT system. Netinfo Security, 2023, 23 (3): 1- 12.  URL
 | 
																													
																						| 20 |  BODKHE U ,  TANWAR S ,  PAREKH K , et al.  Blockchain for industry 4.0: a comprehensive review. IEEE Access, 2020, 8, 79764- 79800.  doi: 10.1109/ACCESS.2020.2988579
 | 
																													
																						| 21 |  SEDLMEIR J ,  SMETHURST R ,  RIEGER A , et al.  Digital identities and verifiable credentials. Business & Information Systems Engineering, 2021, 63 (5): 603- 613.  URL
 | 
																													
																						| 22 |  | 
																													
																						| 23 |  DAN B .  The decision Diffie-Hellman problem. Berlin, Germany: Springer, 1998. | 
																													
																						| 24 |  BONEH D ,  BOYEN X .  Short signatures without random oracles and the SDH assumption in bilinear groups. Journal of Cryptology, 2008, 21 (2): 149- 177.  doi: 10.1007/s00145-007-9005-7
 |