[1] |
GOYAL V , PANDEY O , SAHAI A , et al. Attribute-based encryp-tion for fine-grained access control of encrypted data[C]// CCS’06,ACM. c2006:89-98.
|
[2] |
BETHENCOURT J , SAHAI A , WATERS B . Ciphertext-policy attribute-based encryption[C]// S&P’07,IEEE, c2007:321-334.
|
[3] |
WATERS B . Ciphertext-policy attribute-based encryption:an ex-pressive,efficient,and provably secure realization[C]// PKC’11,Berlin:Springer. c2011:53-70.
|
[4] |
LEWKO A B , OKAMOTO T , SAHAI A , et al. Fully secure func-tional encryption:attribute-based encryption and (hierarchical) in-ner product encryption[C]// EUROCRYPT’10,Berlin:Springer. c2010:62-91.
|
[5] |
LEWKO A B , WATERS B . Decentralizing attribute-based encryp-tion[C]// EUROCRYPT’11,Berlin:Springer. c2011:568-588.
|
[6] |
LI Q , MA J , LI R , et al. Large universe decentralized key-policy attribute-based encryption[J]. Security and communication Net-works, 2014,8(3):501-509.
|
[7] |
CHEUNG L , NEWPORT C C . Provably secure ciphertext policy ABE[C]// The 14th ACM Conference on Computer and Communi-cations Security ACM. c2007:456-465.
|
[8] |
OSTROVSKY R , SAHAI A , WATERS B . Attribute-based encryp-tion with non-monotonic access structures[C]// The 14th ACM on Computer and Communications Security. c2007:195-203.
|
[9] |
YU S , WANG C , REN K , et al. Achieving secure,scalable,and fine-grained data access control in cloud computing[C]// The 29th IEEE Internet Conference Computer Communication. c2010:1-9.
|
[10] |
TYSOWSKI P , HASAN M . Hybrid attribute and re-encryption-based key management for secure and scalable mo-bile applications in clouds[C]// IEEE Transactions Cloud Comput-ing. c2013:172-186.
|
[11] |
CHASE M . Multi-authority attribute based encryption[C]// Theory of Cryptography,Berlin:Springer-Verlag. 2007:515-534.
|
[12] |
CHASE M , CHOW S S M . Improving privacy and security in multi-authority attribute-based encryption[C]// The 16th CCS. c2009:121-130.
|
[13] |
LIN H , CAO Z , LIANG X , et al. Secure threshold multi authority attribute based encryption without a central authority[J]. Informa-tion Sciences an International Journal. 2010,180(13):2618-2632.
|
[14] |
BO?OVI? V , SOCEK D , STEINWANDT R , et al. Multi-authority attribute-based encryption with honest-but-curious central author-ity[J]. International Journal of Computer Mathematics. 2011,90(3):268-283.
|
[15] |
LI F , RAHULAMATHAVAN Y , RAJARAJAN M , et al. Low com-plexity multi-authority attribute based encryption scheme for mo-bile cloud computing[C]// The 7th SOSE,IEEE. c2013:573-577.
|
[16] |
YANG K , JIA X , REN K , et al. DAC-MACS:Effective data access control for multi-authority cloud storage systems[C]// The IEEE INFOCOM. c2013:2895-2903.
|
[17] |
YU S , WANG C , REN K , et al. Secure,efficient and fine-grained data access control mechanism for p2p storage cloud[C]// IEEE Transactions on Cloud Computing. c2010:261-270.
|
[18] |
RUJ S , STOJMENOVIC M , NAYAK A . Decentralized access control with anonymous authentication of data stored in clouds[C]// IEEE Trans.Parallel and Distributed Systems. c2014:384-394.
|
[19] |
YANG K , JIA X H . Expressive,efficient,and revocable data access control for multi-authority cloud storage[C]// IEEE Trans Parallel and Distributed Systems. c2014:1735-1744.
|
[20] |
HE H , LI R X , DONG X H , et al. Secure,efficient and fine-grained data access control mechanism for p2p storage cloud[C]// IEEE Transactions on Cloud Computing. c2014:471-484.
|
[21] |
BINBUSAYYIS A , ZHANG N . Decentralized attribute-based encryption scheme with scalable revocation for sharing data in public cloud servers[C]// Cloud Technologies and Applications, c2015:1-8.
|
[22] |
YANG K , JIA X H , REN K . Secure and verifiable policy update outsourcing for big data access control in the cloud[C]// IEEE Trans.Parallel and Distributed Systems, c2014:3461-3470.
|