1 |
SAHAI A, WATERS B. Fuzzy identity-based encryption[C]//Proceedings of the 24th Annual International Conference on Theory and Applications of Cryptographic Techniques. Berlin: Springer, 2005: 457-473.
|
2 |
GOYAL V, PANDEY O, SAHAI A, et al. Attribute-based encryption for fine-grained access control of encrypted data[C]//Proceedings of the 13th ACM Conference On Computer And Communications Security. New York, ACM, 2006: 89-98.
|
3 |
BETHENCOURT J, SAHAI A, WATERS B. Ciphertext-policy attribute-based encryption[C]//2007 IEEE Symposium on Security and Privacy. Piscataway: IEEE, 2007: 321-334.
|
4 |
WATERS B. Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization[C]//International Workshop on Public Key Cryptography. Berlin, Heidelberg: Springer, 2011: 53-70.
|
5 |
BALU A, KUPPUSAMY K. An expressive and provably secure ciphertext-policy attribute-based encryption[J]. Information Sciences, 2014, 276: 354-362.
|
6 |
LIANG X H, CAO Z F, LIN H, et al. Attribute based proxy re-encryption with delegating capabilities[C]//Proceedings of the 4th International Symposium on Information, Computer, and Communications Security. New York, ACM, 2009: 276-286.
|
7 |
LUO S, HU J B, CHEN Z. Ciphertext policy attribute-based proxy re-encryption[C]//International Conference on Information and Communications Security. Berlin, Heidelberg: Springer, 2010: 401-415.
|
8 |
LI J J, LIU Z H, ZU L H. Chosen-ciphertext secure multi-use unidirectional attribute-based proxy re-encryptions[C]//2014 Ninth Asia Joint Conference on Information Security. Piscataway: IEEE, 2014: 96-103.
|
9 |
KAWAI Y. Outsourcing the re-encryption key generation: flexible ciphertext-policy attribute-based proxy re-encryption[M]//Information Security Practice and Experience. Cham: Springer International Publishing, 2015: 301-315.
|
10 |
LIANG K T, AU M H, LIU J K, et al. A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing[J]. Future Generation Computer Systems, 2015, 52: 95-108.
|
11 |
LIANG K T, FANG L M, SUSILO W, et al. A ciphertext-policy attribute-based proxy re-encryption with chosen-ciphertext security[C]//2013 5th International Conference on Intelligent Networking and Collaborative Systems. Piscataway: IEEE, 2013: 552-559.
|
12 |
杨贺昆, 冯朝胜, 晋云霞, 等. 支持可验证加解密外包的CP-ABE方案[J]. 电子学报, 2020, 48(8): 1545-1551.
|
|
YANG H K, FENG C S, JIN Y X, et al. ACP-ABE scheme with verifiable outsourced encryption and decryption[J]. Acta Electronica Sinica, 2020, 48(8): 1545-1551. (in Chinese)
|
13 |
ZENG P, CHOO K K R. A new kind of conditional proxy re-encryption for secure cloud storage[J]. IEEE Access, 2018, 6: 70017-70024.
|
14 |
冯朝胜, 罗王平, 秦志光, 等. 支持多种特性的基于属性代理重加密方案[J]. 通信学报, 2019, 40(6): 177-189.
|
|
FENG C S, LUO W P, QIN Z G, et al. Attribute-based proxy re-encryption scheme with multiple features[J]. Journal on Communications, 2019, 40(6): 177-189. (in Chinese)
|
15 |
DENG H, QIN Z, WU Q H, et al. Flexible attribute-based proxy re-encryption for efficient data sharing[J]. Information Sciences, 2020, 511: 94-113.
|
16 |
ZHENG D, QIN B D, LI Y N, et al. Cloud-assisted attribute-based data sharing with efficient user revocation in the Internet of Things[J]. IEEE Wireless Communications, 2020, 27(3): 18-23.
|
17 |
LIN H Y, HUNG Y M. An improved proxy re-encryption scheme for IoT-based data outsourcing services in clouds[J]. Sensors (Basel, Switzerland), 2020, 21(1): 67.
|
18 |
GUO H, ZHANG Z F, XU J, et al. Accountable proxy re-encryption for secure data sharing[J]. IEEE Transactions on Dependable and Secure Computing, 2021, 18(1): 145-159.
|
19 |
YU S C, WANG C, REN K, et al. Achieving secure, scalable, and fine-grained data access control in cloud computing[C]//2010 Proceedings IEEE INFOCOM. Piscataway: IEEE, 2010: 1-9.
|
20 |
TYSOWSKI P K, HASAN M A. Hybrid attribute- and re-encryption-based key management for secure and scalable mobile applications in clouds[J]. IEEE Transactions on Cloud Computing, 2013, 1(2): 172-186.
|
21 |
LI J, YAO W, ZHANG Y, et al. Flexible and fine-grained attribute-based data storage in cloud computing[J]. IEEE Transactions on Services Computing, 2017, 10(5): 785-796.
|
22 |
LI L, WANG Z, LI N. Efficient attribute-based encryption outsourcing scheme with user and attribute revocation for fog-enabled IoT[J]. IEEE Access, 2020, 8: 176738-176749.
|