[1] Hoerbst A,Ammenwerth E.Electronic health records[J].Methods Inf Med,2010,49(4):320-336.
[2] Sinsky C A,Beasley J W,Simmons G E,et al.Electronic health records:design,implementation,and policy for higher-value primary care[J].Annals of Internal Medicine,2014,160(10):727-728.
[3] Blumenthal D,Tavenner M.The "meaningful use" regulation for electronic health records[J].New England Journal of Medicine,2010,363(6):501-504.
[4] Gellert G A,Ramirez R,Webster S L.The rise of the medical scribe industry:implications for the advancement of electronic health records[J].JAMA,2015,313(13):1315-1316.
[5] Ateniese G,Chou D H,De Medeiros B,et al.Sanitizable signatures[A].ESORICS 2005[C].Berlin:Springer Heidelberg,2005.159-177.
[6] Krawczyk H,Rabin T.Chameleon hashing and signatures[EB/OL].http://eprint.iacr.org/1998/010,1998-03-17/2017-01-09.
[7] Canard S,Jambert A,Lescuyer R.Sanitizable signatures with several signers and sanitizers[A].AFRICACRYPT 2012[C].Berlin:Springer Heidelberg,2012.35-52.
[8] Brzuska C,Fischlin M,Lehmann A,et al.Unlinkability of sanitizable signatures[A].PKC 2010[C].Berlin:Springer Heidelberg.2010.444-461.
[9] Brzuska C,Pøhls H C,Samelin K.Non-interactive public accountability for sanitizable signatures[A].EuroPKI 2012[C].Berlin:Springer Heidelberg,2013.178-193.
[10] Brzuska C,P?hls H C,Samelin K.Efficient and perfectly unlinkable sanitizable signatures without group signatures[A].EuroPKI 2013[C].Berlin:Springer Heidelberg,2014.12-30.
[11] Agrawal S,Kumar S,Shareef A,et al.Sanitizable signatures with strong transparency in the standard model[A].Inscrypt 2009[C].Berlin:Springer Heidelberg,2010.93-107.
[12] 王小明,付红,张立臣.基于属性的访问控制研究进展[J].电子学报,2010,38(7):1660-1667. Wang Xiaoming,Fu Hong,Zhang Lichen.Research progress on attribute based access control[J].Acta Electronica Sinica,2010,38(7):1660-1667.(in Chinese)
[13] Yang P,Cao Z,Dong X.Fuzzy identity based signature[EB/OL].http://eprint.iacr.org/2008/002,2007-12-31/2017-01-09.
[14] Shahandashti S F,Safavi-Naini R.Threshold attribute-based signatures and their application to anonymous credential systems[A].AFRICACRYPT 2009[C].Berlin:Springer Heidelberg,2009.198-216.
[15] Maji H K,Prabhakaran M,Rosulek M.Attribute-based signatures:achieving attribute-privacy and collusion-resistance[EB/OL].http://eprint.iacr.org/2008/328,2008-07-29/2017-01-09.
[16] Su J,Cao D,Zhao B,et al.ePASS:An expressive attribute-based signature scheme with privacy and an unforgeability guarantee for the internet of things[J].Future Generation Computer Systems,2014,33:11-18.
[17] 李琦,马建峰,熊金波,等.一种素数阶群上构造的自适应安全的多授权机构CP-ABE方案[J].电子学报,2013,42(4):696-702. Li Qi,Ma Jianfeng,Xiong Jinbo,et al.An adaptively secure multi-authority ciphertext-policy ABE scheme on prime order groups[J].Acta Electronica Sinica,2013,42(4):696-702.(in Chinese) |