[1] Guo L,Zhang C,Sun J.A privacy-preserving attribute-based authentication system for mobile health networks[J].IEEE Transactions on Mobile Computing,2014,13(9):1927-1941.
[2] Colman-Meixner C,Develder C,Tornatore M.A Survey on resiliency techniques in cloud computing infrastructures and applications[J].IEEE Communications Surveys & Tutorials,2016,18(3):2244-2281.
[3] 张涛,马建峰,习宁,等.面向服务移动社交网络中基于信任的分布式服务组合方法[J].电子学报,2016,44(2):258-267. Zhang T,Ma J-F,Xi N,et al.Trust-based decentralized service composition approach in service-oriented mobile social networks[J].Acta Electronica Sinica,2016,44(2):258-267.(in Chinese)
[4] 冯朝胜,秦志光,袁丁,等.云计算环境下访问控制关键技术[J].电子学报,2015,43(2):312-319. Feng C-S,Qing Z-G,Yuan D,et al.Key techniques of access control for cloud computing[J].Acta Electronica Sinica,2015,43(2):312-319.(in Chinese)
[5] 程瑶,应凌云,焦四辈,等.移动社交应用的用户隐私泄漏问题研究[J].计算机学报,2014,37(1):87-100. CHENG Y,YING L-Y,JIAO S-B,et al.Research on user privacy leakage in mobile social messaging applications[J].Chinese Journal of Computers,2014,37(1):87-100.(in Chinese)
[6] Sarpong S,Xu C.A secure and efficient privacy-preserving attribute matchmaking protocol in proximity-based mobile social networks[A].Proceedings of Advanced Data Mining and Applications[C].Berlin:Springer International Publishing,2014.305-318.
[7] Li M,Cao N,Yu S,Lou W.Findu:Privacy-preserving personal profile matching in mobile social networks[A].Proceedings of 30th IEEE International Conference on Computer Communications (INFOCOM)[C].USA:IEEE,2011.2435-2443.
[8] Yan Z,Ding W,Niemi V.Two Schemes of privacy-preserving trust evaluation[J].Future Generation Computer Systems,2015,62(C):175-189.
[9] Kiraz M S,Genc Z A,Kardas S.Security and efficiency analysis of the Hamming distance computation protocol based on oblivious transfer[J].Security & Communication Networks,2015,8(18):4123-4135.
[10] Zhang R,Zhang J,Zhang Y,Sun J.Privacy-preserving profile matching for proximity-based mobile social networking[J].IEEE Journal on Selected Areas in Communications,2013,31(9):656-668.
[11] Niu B,Zhu X,Liu J.Weight-aware private matching scheme for proximity-based mobile social networks[A].Proceedings of IEEE Global Communications Conference (GLOBECOM)[C].USA:IEEE,2013.3170-3175.
[12] Zhu X,Chen Z,Chi H.Two-party and multi-party private matching for proximity-based mobile social networks[A].Proceedings of IEEE International Conference on Communications (ICC)[C].USA:IEEE,2014.926-931.
[13] Han J,Susilo W,Mu Y.Privacy-preserving decentralized key-policy attribute-based encryption[J].IEEE Transactions on Parallel & Distributed Systems,2012,23(11):2150-2162.
[14] Ostrovsky R,Sahai A,Waters B.Attribute-based encryption with non-monotonic access structures[A].Proceedings of the 14th ACM Conference on Computer and Communications Security[C].USA:ACM,2007.195-203.
[15] Lewko A,Okamoto T,Sahai A.Fully secure functional encryption:Attribute-based encryption and (hierarchical) inner product encryption[A].Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques[C].USA:IACR,2010.62-91.
[16] Tan S F,Samsudin A.Key policy-attribute based fully homomorphic encryption (KP-ABFHE) scheme for securing cloud application in multi-users environment[A].Proceedings of the 9th International Conference on Robotic,Vision,Signal Processing and Power Applications[C].Berlin:Springer Singapore,2017.77-86.
[17] Xu P,Tang Y,Jiang W.Ciphertext-policy attribute-based encryption with short keys[J].Chinese Journal of Electronics,2014,23(4):655-660.
[18] Rao Y S.A secure and efficient ciphertext-policy attribute-based signcryption for personal health records sharing in cloud computing[J].Future Generation Computer Systems,2017,67:133-151.
[19] Zhou Z,Huang D,Wang Z.Efficient privacy-preserving ciphertext-policy attribute based-encryption and broadcast encryption[J].IEEE Transactions on Computers,2015,64(1):126-138.
[20] Luo E,Liu Q,Wang G.Hierachical multi-authority and attribute-based encryption friend discovery scheme in mobile social networks[J].IEEE Communications Letters,2016,20(9):1772-1775.
[21] WATERS B.Ciphertext-policy attribute-based encryption:an expressive,efficient,and provably secure realization[A].Lectnres Notes in Computer Science[C].Berlin:Springer,2011,vol 6571.321-334.
[22] 刘梦君,刘树波,等.基于LSSS共享矩阵无授权策略的属性密码解密效率提高方案[J].电子学报,2015,43(6):1066-1072. LIU Meng-jun,LIU Shu-bo,et al.Optimizing the decryption efficiency in LSSS matrix-based attribute-based encryption without given policy[J].Acta Electronica Sinica,2015,43(6):1065-1072.(in Chinese)
[23] Cramer R,Shoup V.A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack[A].Proceedings of International Conference on Advances in Cryptology[C] USA:IACR,1998.13-25. |