[1] BETHENCOURT J,SAHAI A,WATERS B.Ciphertext-policy attribute-based encryption[A].Proceedings of the IEEE Symposium on Security and Privacy[C].Washington:IEEE Computer Society,2007.321-334.
[2] 刘梦君,刘树波,等.基于LSSS共享矩阵无授权策略的属性密码解密效率提高方案[J].电子学报,2015,43(6):1065-1072. LIU Meng-jun,LIU Shu-bo,et al.Optimizing the decryption efficiency in LSSS matrix-based attribute-based encryption without given policy[J].Acta Electronica Sinica,2015,43(6):1065-1072.(in Chinese)
[3] SOOKHAK M,YU F R,et al.Attribute-based data access control in mobile cloud computing:Taxonomy and open issues[J].Future Generation Computer Systems,2017,72(C):273-287.
[4] EMURA K,MIYAJI A,et al.A ciphertext-policy attribute-based encryption scheme with constant ciphertext length[A].Proceedings of the International Conference on Information Security Practice and Experience[C].Berlin:Springer,2009.13-23.
[5] GE A,ZHANG R,et al.Threshold ciphertext policy attribute-based encryption with constant size ciphertexts[A].Proceedings of the Australasian Conference on Information Security and Privacy[C].Berlin:Springer,2012.336-349.
[6] ZHANG Y,ZHENG D,et al.Computationally efficient ciphertext-policy attribute-based encryption with constant-size ciphertexts[A].Proceedings of the International Conference on Provable Security[C].Berlin:Springer,2014.259-273.
[7] ODELU V,DAS A K,et al.Pairing-based CP-ABE with constant-size ciphertexts and secret keys for cloud environment[J].Computer Standards & Interfaces,2016,54(P1):3-9.
[8] PIRRETTI M,TRAYNOR P,et al.Secure attribute-based systems[A].Proceedings of the ACM Conference on Computer and Communications Security[C].New York:ACM,2006.99-112.
[9] RAFAELI S,HUTCHISON D.A survey of key management for secure group communication[J].ACM Computing Surveys,2003,35(3):309-329.
[10] HUR J,NOH D K.Attribute-based access control with efficient revocation in data outsourcing systems[J].IEEE Transactions on Parallel and Distributed Systems,2011,22(7):1214-1221.
[11] SHIRAISHI Y,NOMURA K,et al.Attribute revocable attribute-based encryption with forward secrecy for fine-grained access control of shared data[J].IEICE Transactions on Information and Systems,2017,100(10):2432-2439.
[12] LI Ji-guo,YAO Wei,et al.User collusion avoidance CP-ABE with efficient attribute revocation for cloud storage[J].IEEE Systems Journal,2017,PP(99):1-11.
[13] 闫玺玺,叶青,刘宇.云环境下支持隐私保护和用户撤销的属性基加密方案[J].信息网络安全,2017(6):14-21. YAN Xi-xi,YE Qing,LIU Yu.Attribute-based encryption scheme supporting privacy preserving and user revocation in the cloud environment[J].Netinfo Security,2017(6):14-21.(in Chinese)
[14] 张应辉,郑东,等.密文长度恒定且属性直接可撤销的基于属性的加密[J].密码学报,2014,1(5):465-480. ZHANG Ying-hui,ZHENG Dong,et al.Attribute directly-revocable attribute-based encryption with constant ciphertext length[J].Journal of Cryptologic Research,2014,1(5):465-480.(in Chinese)
[15] 冯登国,陈成.属性密码学研究[J].密码学报,2014,1(1):1-12. FENG Deng-guo,CHEN Cheng.Research on attribute-based cryptography[J].Journal of Cryptologic Research,2014,1(1):1-12.(in Chinese) |