| 1 |
SAI S , CHAMOLA V , CHOO K-K R , et al. Confluence of blockchain and artificial intelligence technologies for secure and scalable healthcare solutions: a review. IEEE Internet of Things Journal, 2022, 10 (7): 5873- 5897.
URL
|
| 2 |
WANG H Y , LIANG J L , DING Y , et al. Ciphertext-policy attribute-based encryption supporting policy-hiding and cloud auditing in smart health. Computer Standards & Interfaces, 2023, 84, 103696.
doi: 10.1016/j.csi.2022.103696
|
| 3 |
ZHANG G , DING Z , XU J , et al. Reasoning and tracing of information security events in the expressway networking system based on deep learning. International Journal of Intelligent Systems, 2022, 37 (11): 8988- 9012.
doi: 10.1002/int.22977
|
| 4 |
蒋淇淇, 张亮, 彭凌祺, 等. 基于区块链的可问责可验证外包分层属性加密方案. 计算机工程, 2025, 51 (3): 24- 33.
doi: 10.19678/j.issn.1000-3428.0069378
|
|
JIANG Q Q , ZHANG L , PENG L Q , et al. Accountable and verifiable outsourced hierarchical attribute encryption scheme based on blockchain. Computer Engineering, 2025, 51 (3): 24- 33.
doi: 10.19678/j.issn.1000-3428.0069378
|
| 5 |
GOPALA M , SRIRAM G . Edge computing vs. cloud computing: an overview of big data challenges and opportunities for large enterprises. International Research Journal of Modernization in Engineering Technology and Science, 2022, 4 (1): 1331- 1337.
doi: 10.0202/Computin.2022197786
|
| 6 |
ZHANG Y H , ZHU T , GUO R , et al. Multi-keyword searchable and verifiable attribute-based encryption over cloud data. IEEE Transactions on Cloud Computing, 2021, 11 (1): 971- 983.
URL
|
| 7 |
SETHI K , PRADHAN A , BERA P . PMTER-ABE: a practical multi-authority CP-ABE with traceability, revocation and outsourcing decryption for secure access control in cloud systems. Cluster Computing, 2021, 24, 1525- 1550.
doi: 10.1007/s10586-020-03202-2
|
| 8 |
LI H , YU K P , LIU B , et al. An efficient ciphertext-policy weighted attribute-based encryption for the Internet of health things. IEEE Journal of Biomedical and Health Informatics, 2021, 26 (5): 1949- 1960.
URL
|
| 9 |
SONG D X, WAGNER D, PERRIG A. Practical techniques for searches on encrypted data[C]//Proceeding of IEEE Symposium on Security and Privacy. Washington D. C., USA: IEEE Press, 2000: 44-55.
|
| 10 |
BONEH D, DI CRESCENZO G, OSTROVSKY R, et al. Public key encryption with keyword search[C]// Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques. Berlin, Germany: Springer, 2004: 506-522.
|
| 11 |
|
| 12 |
YU Y , SHI J B , LI H L , et al. Key-policy attribute-based encryption with keyword search in virtualized environments. IEEE Journal on Selected Areas in Communications, 2020, 38 (6): 1242- 1251.
doi: 10.1109/JSAC.2020.2986620
|
| 13 |
YIN H , ZHANG J X , XIONG Y Q , et al. CP-ABSE: a ciphertext-policy attribute-based searchable encryption scheme. IEEE Access, 2019, 7, 5682- 5694.
doi: 10.1109/ACCESS.2018.2889754
|
| 14 |
BOLDYREVA A, GOYAL V, KUMAR V. Identity-based encryption with efficient revocation[C]//Proceedings of the 15th ACM Conference on Computer and communications Security. New York, USA: ACM Press, 2008: 417-426.
|
| 15 |
LI J G , YAO W , HAN J G , et al. User collusion avoidance CP-ABE with efficient attribute revocation for cloud storage. IEEE Systems Journal, 2017, 12 (2): 1767- 1777.
URL
|
| 16 |
LIAN H J , WANG Q X , WANG G B . Large universe ciphertext-policy attribute-based encryption with attribute level user revocation in cloud storage. The International Arab Journal Information Technology, 2020, 17 (1): 107- 117.
doi: 10.34028/iajit/17/1/13
|
| 17 |
BOUCHAALA M , GHAZEL C , SAIDANE L A . Trak-CPABE: a novel traceable, revocable and accountable ciphertext-policy attribute-based encryption scheme in cloud computing. Journal of Information Security and Applications, 2021, 61, 102914.
doi: 10.1016/j.jisa.2021.102914
|
| 18 |
LIU Z H , DUAN S H , ZHOU P L , et al. Traceable-then-revocable ciphertext-policy attribute-based encryption scheme. Future Generation Computer Systems, 2019, 93, 903- 913.
doi: 10.1016/j.future.2017.09.045
|
| 19 |
HAN D Z , PAN N N , LI K-C . A traceable and revocable ciphertext-policy attribute-based encryption scheme based on privacy protection. IEEE Transactions on Dependable and Secure Computing, 2022, 19 (1): 316- 327.
doi: 10.1109/TDSC.2020.2977646
|
| 20 |
ZHANG Y H , DENG R H , XU S , et al. Attribute-based encryption for cloud computing access control: a survey. ACM Computing Surveys, 2020, 53 (4): 1- 41.
URL
|
| 21 |
YANG F , LIU L , YOU W , et al. You are revoked and out: towards directly revocable ciphertext-policy attribute-based encryption. Security and Communication Networks, 2022, 41, 1- 17.
|
| 22 |
ZHANG Y H , ZHENG D , DENG R H . Security and privacy in smart health: efficient policy-hiding attribute-based access control. IEEE Internet of Things Journal, 2018, 5 (3): 2130- 2145.
doi: 10.1109/JIOT.2018.2825289
|
| 23 |
MOHD SATAR S D , HUSSIN M , HANAPI Z M , et al. Towards virtuous cloud data storage using access policy hiding in ciphertext policy attribute-based encryption. Future Internet, 2021, 13 (11): 279.
doi: 10.3390/fi13110279
|
| 24 |
CHAUDHARI P , DAS M L . KeySea: keyword-based search with receiver anonymity in attribute-based searchable encryption. IEEE Transactions on Services Computing, 2022, 15 (2): 1036- 1044.
doi: 10.1109/TSC.2020.2973570
|
| 25 |
RASORI M , LA MANNA M , PERAZZO P , et al. A survey on attribute-based encryption schemes suitable for the Internet of things. IEEE Internet of Things Journal, 2022, 9 (11): 8269- 8290.
doi: 10.1109/JIOT.2022.3154039
|
| 26 |
HE Y , WANG H Y , LI Y , et al. An efficient ciphertext-policy attribute-based encryption scheme supporting collaborative decryption with blockchain. IEEE Internet of Things Journal, 2022, 9 (4): 2722- 2733.
doi: 10.1109/JIOT.2021.3099171
|
| 27 |
王经纬, 宁建廷, 许胜民, 等. 面向可变用户群体的可搜索属性基加密方案. 软件学报, 2023, 34 (4): 1907- 1925.
doi: 10.13328/j.cnki.jos.006698
|
|
WANG J W , NING J T , XU S M , et al. Searchable attribute-based encryption scheme for dynamic user groups. Journal of Software, 2023, 34 (4): 1907- 1925.
doi: 10.13328/j.cnki.jos.006698
|
| 28 |
MIAO Y B , MA J F , LIU X M , et al. Attribute-based keyword search over hierarchical data in cloud computing. IEEE Transactions on Services Computing, 2017, 13 (6): 985- 998.
doi: 10.1109/TSC.2017.2757467
|