[1] Sahai A,Waters B.Fuzzy identity-based encryption[A].Annual International Conference on the Theory and Applications of Cryptographic Techniques[C].Berlin,Heidelberg:Springer,2005.457-473.
[2] 冯朝胜,秦志光,袁丁,等.云计算环境下访问控制关键技术[J].电子学报,2015,43(2):312-319. Feng C S,Qin Z G,Yuan D,et al.Key techniques of access control for cloud computing[J].Acta Electronica Sinica,2015,43(2):312-319.(in Chinese)
[3] Goyal V,Pandey O,Sahai A,et al.Attribute-based encryption for fine-grained access control of encrypted data[A].ACM Conference on Computer and Communications Security[C].New York:ACM,2006.89-98.
[4] Bethencourt J,Sahai A,Waters B.Ciphertext-policy attribute-based encryption[A].IEEE Symposium on Security and Privacy[C].Washington:IEEE Computer Society,2007.321-334.
[5] Karchmer M,Wigderson A.On span programs[A].Proceedings of the Eigth Annual Structure in Complexity Theory Conference[C].San Diego:IEEE,1993.102-111.
[6] Waters B.Ciphertext-policy attribute-based encryption:An expressive,efficient,and provably secure realization[A].International Conference on Practice and Theory in Public Key Cryptography[C].Berlin Heidelberg:Springer,2011.53-70.
[7] Balu A,Kuppusamy K.An expressive and provably secure ciphertext-policy attribute-based encryption[J].Information Sciences,2014,276:354-362.
[8] Thorbek R.Linear integer secret sharing and distributed exponentiation[A].International Workshop on Public Key Cryptography[C].Berlin Heidelberg:Springer,2006.75-90.
[9] Green M,Hohenberger S,Waters B.Outsourcing the decryption of ABE ciphertexts[A].Usenix Conference on Security[C].Berkely:USENIX Association,2011.34-34.
[10] Zhou Z,Huang D.Efficient and secure data storage operations for mobile cloud computing[A].Network and Service Management[C].Las Vegas:IEEE,2012.37-45.
[11] Li J,Jia C,Li J,et al.Outsourcing encryption of attribute-based encryption with mapreduce[A].International Conference on Information and Communications Security[C].Berlin,Heidelberg:Springer,2012.191-201.
[12] Lai J,Deng R H,Guan C,et al.Attribute-based encryption with verifiable outsourced decryption[J].IEEE Transactions on Information Forensics and Security,2013,8(8):1343-1354.
[13] Qin B,Deng R,Liu S,et al.Attribute-based encryption with efficient verifiable outsourced decryption[J].IEEE Transactions on Information Forensics and Security,2015,10(7):1384-1393.
[14] Lin S,Zhang R,Ma H,et al.Revisiting attribute-based encryption with verifiable outsourced decryption[J].IEEE Transactions on Information Forensics & Security,2015,10(10):2119-2130.
[15] Huang Q,Yang Y,Wang L.Secure data access control with ciphertext update and computation outsourcing in fog computing for internet of things[J].IEEE Access,2017,5:12941-12950.
[16] Jiguo L,Fengjie S,Yichen Z,et al.Verifiable outsourced decryption of attribute-based encryption with constant ciphertext length[J].Security and Communication Networks,2017,2017:1-11.
[17] Kai F,Junxiong W,Xin W,et al.A secure and verifiable outsourced access control scheme in fog-cloud computing[J].Sensors,2017,17(7):1695-1710.
[18] 赵志远,王建华,徐开勇,等.面向云存储的支持完全外包属性基加密方案[J].计算机研究与发展,2019,56(2):442-452. Zhao Z Y,Wang J H,Xu K Y,et al.Fully outsourced attribute-based encryption with verifiability for cloud storage[J].Journal of Computer Research and Development,2019,56(2):442-452.(in Chinese)
[19] Rui Z,Hui M,Yao L.Fine-grained access control system based on fully outsourced attribute-based encryption[J].Journal of Systems & Software,2017,125:344-353.
[20] Li Z,Li W,Jin Z,et al.An efficient ABC scheme with verifiable outsourced encryption and decryption[J].IEEE Access,2019,7:29023-29037.
[21] 李帅,付安民,苏铓,等.基于单服务器的群上幂指数安全外包计算方案[J].计算机研究与发展,2018,55(11):142-149. Li S,Fu A,Su M,et al.Secure and verifiable protocol for outsourcing group power exponent to a single server[J].Journal of Computer Research and Development,2018,55(11):2482-2489.(in Chinese)
[22] 冯朝胜,罗王平,秦志光,等.支持多种特性的基于属性代理重加密方案 [J].通信学报,2019,40(6):177-189. Feng,C S.Luo W P.Qin Z G,et al.Attribute-based proxy re-encryption scheme with multiple features[J].Journal on Communications,2019,40(6):177-189.(in Chinese) |