[1] 冯朝胜,秦志光,袁丁.云数据安全存储技术[J].计算机学报,2015,38(1):150-163. FENG Chao-sheng,QIN Zhi-guang,et al.Technigues of secure storage for cloud data[J].Chinese Journal of Computers,2015,38(1):150-163.(in Chinese)
[2] 冯朝胜,秦志光,袁丁,等.云计算环境下访问控制关键技术[J].电子学报,2015,43(2):312-319 FENG Chao-sheng,QIN Zhi-guang,et al.Key techniques of access control for cloud computing[J].Acta Electronica Sinica,2015,43(2):312-319.(in Chinese)
[3] Sahai A,Waters B R.Fuzzy identity-based encryption[A].Ronald Cramer.Proceedings of the 24th Annual International Conference on Theory and Applications of Cryptographic Techniques[C].Berlin:Springer,2004.457-473.
[4] Bethencourt J,Sahai A,Waters B.Ciphertext-policy attribute-based encryption[A].IEEE Symposium on Security and Privacy[C].Washington:IEEE Computer Society,2007. 321-334.
[5] Goyal V,Pandey O,Sahai A,et al.Attribute-based encryption for fine-grained access control of encrypted data[A].Computer and Communications Security[C].New York:ACM,2006.89-98.
[6] Green M,Hohenberger S,Waters B,et al.Outsourcing the decryption of ABE ciphertexts[A].Usenix Security Symposium[C].Berkeley:Usenix Association,2011. 34-34.
[7] Yu S,Wang C,Ren K,et al.Achieving secure,scalable,and fine-grained data access control in cloud computing[A]. International Conference on Computer Communications[C].Berlin,Heidelberg:Springer,2010.534-542.
[8] Attrapadung N,Herranz J,Laguillaumie F,et al.Attribute-based encryption schemes with constant-size ciphertexts[J].Theoretical Computer Science,2012,422:15-38.
[9] Hohenberger S,Waters B.Attribute-based Encryption with Fast Decryption[M].Berlin,Heidelberg:Springer,2013.162-173.
[10] Lai J,Deng R H,Li Y,et al.Fully secure key-policy attribute-based encryption with constant-size ciphertexts and fast decryption[A].ACM Symposium on Information[C].New York:ACM,2014.239-248.
[11] Lin S,Zhang R,Ma H,et al.Revisiting attribute-based encryption with verifiable outsourced decryption[J].IEEE Transactions on Information Forensics and Security,2015,10(10):2119-2130.
[12] Rahulamathavan Y,Veluru S,Han J,et al.User collusion avoidance scheme for privacy-preserving decentralized key-policy attribute-based encryption[J].IEEE Transactions on Computers,2016,65(9):2939-2946.
[13] Liu Z,Jiang Z L,Wang X,et al.Offline/online attribute-based encryption with verifiable outsourced decryption[J].Concurrency and Computation:Practice and Experience,2017,29(7):1532-0626 |