1 |
沈剑, 周天祺, 等. 云数据安全保护方法综述[J]. 计算机研究与发展, 2021, 58(10): 2079-2098.
|
|
SHEN Jian, ZHOU Tianqi, et al. Protection methods for cloud data security[J]. Journal of Computer Research and Development, 2021, 58(10): 2079-2098. (in Chinese)
|
2 |
冯登国, 张敏, 等. 云计算安全研究[J]. 软件学报, 2011, 22(01): 71-83.
|
|
FENG Dengguo, ZHANG Min, et al. Study on cloud computing security[J]. Journal of Software, 2011, 22(01): 71-83. (in Chinese)
|
3 |
张玉清, 王晓菲, 等. 云计算环境安全综述[J]. 软件学报, 2016, 27(06): 1328-1348.
|
|
ZHANG Yuqing, WANG Xiaofei, et al. Survey on cloud computing security[J]. Journal of Software, 2016, 27(06): 1328-1348. (in Chinese)
|
4 |
LI H W, YANG Y, et al. Achieving secure and efficient dynamic searchable symmetric encryption over medical cloud data[J]. IEEE Transactions on Cloud Computing, 2020, 8(2): 484-494.
|
5 |
GE C P, SUSILO W, et al. Revocable attribute-based encryption with data integrity in clouds[J]. IEEE Transactions on Dependable and Secure Computing, 2021, 19(05): 2864-2872.
|
6 |
牛淑芬, 谢亚亚, 等. 区块链上基于云辅助的属性基可搜索加密方案[J]. 计算机研究与发展, 2021, 58(04): 811-821.
|
|
NIU Shufen, XIE Yaya, et al. Cloud-assisted attribute- based searchable encryption scheme on blockchain[J]. Journal of Computer Research and Development, 2021, 58(04): 811-821. (in Chinese)
|
7 |
OSTROVSKY R, SAHAI A, et al. Attribute-based encryption with non-monotonic access structures[C]//Proceedings of the 2007 ACM Conference on Computer and Communications Security. New York: ACM, 2007: 195-203.
|
8 |
HE K, GUO J, et al. Attribute-based hybrid boolean keyword search over outsourced encrypted data[J]. IEEE Transactions on Dependable and Secure Computing, 2020, 17(6): 1207-1217.
|
9 |
佘维, 霍丽娟, 等. 一种可隐藏敏感文档和发送者身份的区块链隐蔽通信模型[J]. 电子学报, 2022, 50(04): 1002-1013.
|
|
SHE Wei, HUO Li-juan, et al. A blockchain-based covert communication model for hiding sensitive documents and sender identity[J]. Acta Electronica Sinica, 2022, 50(04): 1002-1013. (in Chinese)
|
10 |
赵志远, 朱智强, 等. 属性可撤销且密文长度恒定的属性基加密方案[J]. 电子学报, 2018, 46(10): 2391-2399.
|
|
ZHAO Zhi-yuan, ZHU Zhi-qiang, et al. Attribute-based encryption with attribute revocation and constant-size ciphertext[J]. Acta Electronica Sinica, 2018, 46(10): 2391-2399. (in Chinese)
|
11 |
BETHENCOURT J, SAHAI A, et al. Ciphertext-policy attribute-based encryption[C]//Proceedings of the 2007 IEEE Symposium on Security and Privacy. Los Alamitos: IEEE Computer Society, 2007: 321-334.
|
12 |
WATERS B. Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization[C]//Proceedings of the 14th International Conference on Practice and Theory in Public Key Cryptography. Berlin: Springer, 2011: 53-70.
|
13 |
ZENG P, ZHANG Z T, et al. Efficient policy-hiding and large universe attribute-based encryption with public traceability for internet of medical things[J]. IEEE Internet of Things Journal, 2021, 8(13): 10963-10972.
|
14 |
LEWKO A B, WATERS B. Decentralizing attribute-based encryption[C]//Proceedings of the 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Berlin: Springer, 2011: 568-588.
|
15 |
ROUSELAKIS Y, WATERS B. Efficient statically-secure large-universe multi-authority attribute-based encryption[C]//Proceedings of the 19th International Conference on Financial Cryptography and Data Security. Berlin: Springer, 2015: 315-332.
|
16 |
仲红, 崔杰, 等. 高效且可验证的多授权机构属性基加密方案[J]. 软件学报, 2018, 29(7): 2006-2017.
|
|
ZHONG Hong, CUI Jie, et al. Efficient and verifiable muti-authority attribute based encryption scheme[J]. Journal of Software, 2018, 29(7): 2006-2017. (in Chinese)
|
17 |
MIAO Y, DENG R, et al. Multi-authority attribute-based keyword search over encrypted cloud data[J]. IEEE Transactions on Dependable and Secure Computing, 2021, 18(4): 1667-1680.
|
18 |
WEI J H, CHEN X F, et al. Rs-habe: revocable-storage and hierarchical attribute-based access scheme for secure sharing of e-health records in public cloud[J]. IEEE Transactions on Dependable and Secure Computing, 2021, 18(5): 2301-2315.
|
19 |
闫玺玺, 刘媛, 等. 支持隐私保护的多机构属性基加密方案[J]. 计算机研究与发展, 2018, 55(04): 846-853.
|
|
YAN Xixi, LIU Yuan, et al. Multi-authority attribute-based encryption scheme with privacy protection[J]. Journal of Computer Research and Development, 2018, 55(04): 846-853. (in Chinese)
|
20 |
YANG K, JIA X H. Expressive, efficient, and revocable data access control for multi-authority cloud storage[J]. IEEE Transactions on Parallel and Distributed System, 2014, 25(7): 1735-1744.
|
21 |
VARRI U S, KASANI S, et al. FELT-ABKS: fog-enabled lightweight traceable attribute-based keyword search over encrypted data[J]. IEEE Internet of Things, 2022, 9(10): 7559-7517.
|
22 |
CHEN J W, MA H D. Efficient decentralized attribute-based access control for cloud storage with user revocation[C]//Proceeding of the IEEE International Conference on Communications. Piscataway: IEEE, 2014: 3782-3787.
|
23 |
HAN D Z, PAN N N, et al. A traceable and revocable ciphertext-policy attribute-based encryption scheme based on privacy protection[J]. IEEE Transactions on Dependable and Secure Computing, 2022, 19(1): 316-327.
|
24 |
AKINYELE J A, GARMAN C, et al. Charm: a framework for rapidly prototyping cryptosystems[J]. Journal of Cryptographic Engineering, 2013, 3(02): 111-128.
|