[1] Sahai A,Waters B.Fuzzy identity-based encryption [A].Proceedings of the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques [C].Berlin Heidelberg:Springer,2005.457-473.[2] 冯登国,张敏,张妍,等.云计算安全研究[J].软件学报,2011,22(1):71-83. Feng Deng-guo,Zhang Min,Zhang Yan.Study on cloud computing security [J].Journal of Software,2011,22(1):71-83.(in Chinese)[3] 孙国梓,董宇,李云.基于CP-ABE算法的云存储数据访问控制[J].通信学报,2011,32(7):146-152. Sun Guo-zi,Dong Yu,Li Yun.CP-ABE based data access control for cloud storage [J].Journal of Communications,2011,32(7):146-152.(in Chinese)[4] 俞能海,郝卓,徐甲甲,等.云安全研究进展综述[J].电子学报,2013,41(2):371-381. YU Neng-hai,HAO Zhuo,XU Jia-jia.Review of cloud computing security [J].Acta Electronica Sinica,2013,41(2):371-381.(in Chinese)[5] Goyal Pandey O,Sahai A,et al.Attribute based encryption for fine-grained access control of encrypted data [A].Proceedings of ACM Conference on Computer and Communications Security [C].Alexandria,Virginia,USA:ACM,2006.89-98.[6] Bethencourt J,Sahai A,Waters B.Ciphertext-policy attribute-based encryption [A].IEEE Symposium on Security and Privacy(SP'07)[C].Berkeley,California,USA:IEEE,2007.321-334. [7] 孙昌霞,马文平,陈和风.可证明安全的无中心授权的多授权属性签名[J].电子科技大学学报,2012,41(4):552-556.[8] Melissa Chase.Multi-authorityattribute based encryption [A].Proceedings of the 4th Theory of Cryptography Conference [C].Berlin Heidelberg:Springer,2007.515-534.[9] Wang G,Liu Q,Wu J.Hierarchical attribute-based encryption for fine-grained access control in cloud storage services [A].Proceedings of ACM CCS Computer and Communications Security [C].New York,USA:ACM,2010.735-737.[10] Bobba R,Khurana H,Prabhakaran M.Attribute-sets:A practically motivated enhancement to attribute-based encryption [A].Proceedings of ESORICS [C].Berlin Heidelberg:Springer,2009.587-604.[11] Li Ming,Yu Shu-cheng,Zheng Yao.Scalable andsecure sharing of personal health records in cloud computing using attribute-based encryption [J].IEEE Transactions on Parallel and Distributed System,2012,24(1):131-143. |