[1] Sahai A,Waters B R.Fuzzy identity-based encryption[A].Ronald Cramer.Proceedings of the 24th Annual International Conference on Theory and Applications of Cryptographic Techniques[C].Berlin:Springer,2004.457-473.
[2] Goyal V,Pandey O,Sahai A,et al.Attribute-based encryption for fine-grained access control of encrypted data[A].Computer and Communications Security[C].New York:ACM,2006.89-98.
[3] Bethencourt J,Sahai A,Waters B.Ciphertext-policy attribute-based encryption[A].IEEE Symposium on Security and Privacy[C].Washington:IEEE Computer Society,2007.321-334.
[4] Guo F,Mu Y,Chen Z.Identity-Based online/offline encryption[A].The International Conference on Financial Cryptography and Data Security[C].Berlin,Heidelberg:Springer-Verlag,2008.247-261.
[5] Even S,Goldreich O,Micali S.On-Line/Off-Line digital signatures[A].The Conference on the Theory and Application of Cryptology[C].New York:Springer-Verlag,1989.263-275.
[6] X Liu,J Ma,J Xiong,Q Li,J Ma.Ciphertext-policy weighted attribute encryption for fine-grained access control[A].The 5th International Conference on Intelligent Networking and Collaborative Systems[C].Xi'an,China:2013.51-57.
[7] Hohenberger S,Waters B.Online/Offline attribute-based encryption[A].The International Workshop on Public Key Cryptography[C].Berlin,Heidelberg:Springer-Verlag,2014.293-310.
[8] Rouselakis Y,Waters B.Practical constructions and new proof methods for large universe attribute-based encryption[A].The 2013 ACM SIGSAC Conference on Computer & Communications Security[C].Berlin Germany:ACM,2013.463-474.
[9] Green M,Hohenberger S,Waters B,et al.Outsourcing the decryption of ABE ciphertexts[A].Usenix Security Symposium[C].Berkeley:Usenix Association,2011.34-34.
[10] Yang K,Jia X.DAC-MACS:Effective data access control for multi-authority cloud storage systems[A].Security for Cloud Storage Systems[C].New York:Springer-Verlag,2014.59-83.
[11] Shao J,Lu R,Lin X.Fine-Grained data sharing in cloud computing for mobiledevices[A].The 2015 IEEE Conference on Computer Communications (INFOCOM)[C].Hong Kong:IEEE,2015.2677-2685.
[12] Shulan Wang,Kaitai Liang,Joseph K Liu,Jianyong Chen,Jianping Yu,Weixin Xie.Attribute-Based data sharing scheme revisited in cloud computing[J].IEEE Transactions on Information Forensics & Security,2016,1661-1673.
[13] Xue K,Hong J,Xue Y,et al.CABE:A new comparable attribute-based encryption construction with 0-Encoding and 1-Encoding[J].IEEE Transactions on Computers,2017,1-1.
[14] Wei Li,Wei Ni,Dongxi Liu et al.Unified ciphertext-policy weighted attribute-based encryption for sharing data in cloud computing[J].applied sciences,2018,2519.
[15] 仲红,崔杰,朱文龙,许艳.高效且可验证的多授权机构属性基加密方案[J].软件学报,2018,29(7):2006-2017. Zhong H,Cui J,Zhu WL,Xu Y.Efficient and verifiable muti-authority attribute based encryption scheme[J].Ruan Jian Xue Bao/Journal of Software,2018,29(7):2006-2017.(in Chinese)
[16] Qiuting Tian,Dezhi Han,Yanmei Jiang.Hierarchical authority based weighted attribute encryption scheme[J].Computer Science and Information Systems,2018,16(3):797-813.
[17] C Hahn,H Kwon,J Hur.Trustworthy delegation toward securing mobile healthcare cyber-physical systems[J].IEEE Internet of Things Journal,2019,6(4):6301-6309.
[18] J Xu,Q Wen,W Li,Z Jin.Circuit ciphertext-policy attribute-based hybrid encryption with verifiable delegation in cloud computing[J].IEEE Transactions Parallel Distrib.Systtems,2016,27(1):119-129.
[19] S Lin,R Zhang,H Ma,M Wang.Revisiting attribute-based encryption with verifiable outsourced decryption[J].IEEE Transactions Information Forensics Security,2015,10(10):2119-2130.
[20] Yinbin Miao,Qiuyun Tong,Kim-Kwang Raymond Choo,et al.Secure online/offline data sharing framework for cloud-assisted industrial internet of things[J].IEEE Internet of Things Journal,2019,6(5):8681-8691.
[21] H-Y Lin,W-G Tzeng.An efficient solution to the millionaires' problem based on homomorphic encryption[A].Applied Cryptography and Network Security[C].Berlin,Heidelberg:2005.456-466.
[22] B Waters.Ciphertext-policy attribute-based encryption:An expressive,efficient,and provably secure realization[A].The 14th International Conference on Practice and Theory in Public Key Cryptography[C].Edinburgh:2011.53-70. |