[1] |
张玉清, 王晓菲, 刘雪峰 ,等. 云计算环境安全综述[J]. 软件学报, 2016,27(6): 1328-1348.
|
|
ZHANG Y Q , WANG X F , LIU X F ,et al. Survey on cloud computing security[J]. Journal of Software, 2016,27(6): 1328-1348.
|
[2] |
SUN P J . Privacy protection and data security in cloud computing:a survey,challenges and solutions[J]. IEEE Access, 2019,(99): 1.
|
[3] |
BLAZE M . Divertible protocols and atomic proxy cryptography[J]. EUROCRYPT, 1998: 127-144.
|
[4] |
王悦, 樊凯 . 隐藏访问策略的高效CP-ABE方案[J]. 计算机研究与发展, 2019,56(10): 2151-2159.
|
|
WANG Y , FAN K . Effective CP-ABE with hidden access policy[J]. Journal of Computer Research and Development, 2019,56(10): 2151-2159.
|
[5] |
冯朝胜, 罗王平, 秦志光 ,等. 支持多种特性的基于属性代理重加密方案[J]. 通信学报, 2019,40(6): 177-189.
|
|
FENG CS , LUO W P , QIN Z G ,et al. Attribute-based proxy re-encryption scheme with multiple features[J]. Journal on Communications, 2019,40(6): 177-189.
|
[6] |
LIANG K , FANG L , SUSILO W ,et al. A ciphertext-policy attribute-based proxy re-encryption with chosen-ciphertext security[C]// Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013.
|
[7] |
沈剑, 周天祺, 曹珍富 . 云数据安全保护方法综述[J]. 计算机研究与发展, 2021,58(10): 2079-2098.
|
|
SHEN J , ZHOU T Q , CAO Z F . Protection methods for cloud data security[J]. Journal of Computer Research and Development, 2021,58(10): 2079-2098.
|
[8] |
BETHENCOURT J , SAHAI A , WATERS B . Ciphertext-policy attribute-based encryption[C]// Proceedings of the 2007 IEEE Symposium on Security and Privacy (SP '07). 2007.
|
[9] |
苏铓, 吴槟, 付安民 ,等. 基于代理重加密的云数据访问授权确定性更新方案[J]. 软件学报, 2020,31(5): 1563-1572.
|
|
SU M , WU B , FU A M ,et al. Assured update scheme of authorization for could data access based on proxy re-encryption[J]. Journal of Software, 2020,31(5): 1563-1572.
|
[10] |
牛淑芬, 陈俐霞, 刘文科 ,等. 电子邮件系统中支持关键字搜索的代理重加密方案[J]. 计算机工程, 2020,46(6): 136-143.
|
|
NIU S F , CHEN L X , LIU W K ,et al. Proxy re-encryption scheme supporting keyword search in email system[J]. Computer Engineering, 2020,46(6): 136-143.
|
[11] |
牛淑芬, 刘文科, 陈俐霞 ,等. 基于联盟链的可搜索加密电子病历数据共享方案[J]. 通信学报, 2020,41(8): 204-214.
|
|
NIU S F , LIU W K , CHEN L X ,et al. Electronic medical record data sharing scheme based on searchable encryption via consortium blockchain[J]. Journal on Communications, 2020,41(8): 204-214.
|
[12] |
FUGKEAW S . A lightweight policy update scheme for outsourced personal health records sharing[J]. IEEE Access, 2021,9: 54862-54871.
|
[13] |
LUO F , AL-KUWARI S , WANG F ,et al. Attribute-based proxy re-encryption from standard lattices[J]. Theoretical Computer Science, 2021,865: 52-62.
|
[14] |
江明明, 郭宇燕, 余磊 ,等. 有效的标准模型下格上基于身份的代理重加密[J]. 电子与信息学报, 2019,41(1): 61-66.
|
|
JIANG M M , GUO Y Y , YU L ,et al. Efficient identity-based proxy re-encryption on lattice in the standard model[J]. Journal of Electronics & Information Technology, 2019,41(1): 61-66.
|
[15] |
LIANG X H C Z F , LIN H , ET AL . Attribute based proxy re-encryption with delegating capabilities[C]// Proceedings of the ACM Symposium on Information,Computer and Communications Security. 2009.
|
[16] |
LIANG K , AU M H , LIU J K ,et al. A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing[J]. Future Generation Computer Systems, 2015,52: 95-108.
|
[17] |
KAWAI Y , . Outsourcing the re-encryption key generation:flexible ciphertext-policy attribute-based proxy re-encryption[C]// Information Security Practice and Experience. 2015: 301-315.
|
[18] |
GE C , SUSILO W , FANG L ,et al. A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system[J]. Designs Codes & Cryptography, 2018.
|
[19] |
CHASE M , . Multi-authority attribute based encryption[C]// Proceedings of the Lecture Notes in Computer Science. 2007.
|
[20] |
CHEN D , WAN L , WANG C ,et al. A Multi-authority attributebased encryption scheme with pre-decryption[Z]. Seventh International Symposium on Parallel Architectures,Algorithms and Programming (PAAP). 2015: 223-228.
|
[21] |
关志涛, 杨亭亭, 徐茹枝 ,等. 面向云存储的基于属性加密的多授权中心访问控制方案[J]. 通信学报, 2015,36(6): 120-130.
|
|
GUAN Z T , YANG T T , XU R Z ,et al. Multi-authority attribute-based encryption access control model for cloud storage[J]. Journal on Communications, 2015,36(6): 120-130.
|
[22] |
仲红, 崔杰, 朱文龙 ,等. 高效且可验证的多授权机构属性基加密方案[J]. 软件学报, 2018,29(7): 2006-2017.
|
|
ZHONG H , CUI J , ZHU W L ,et al. Efficient and verifiable multi-authority attribute based encryption scheme[J]. Journal of Software, 2018,29(7): 2006-2017.
|
[23] |
杨小东, 杨苗苗, 刘婷婷 ,等. 基于多授权中心属性基加密的多域云访问控制方案[J]. 计算机工程与科学, 2018,40(7): 1192-1198.
|
|
YANG X D , YANG M M , LIU T T ,et al. A multi-domain access control scheme based on multi-authority attribute encryption for cloud storage[J]. Computer Engineering &Science, 2018,40(7): 1192-1198.
|
[24] |
罗恩韬, 王国军, 陈淑红 ,等. 移动社交网络中跨域代理重加密朋友发现隐私保护方案研究[J]. 通信学报, 2017,38(10): 81-93.
|
|
LUO E T , WANG G J ,, CHEN S H , et al . Privacy preserving friend discovery cross domain scheme using re-encryption in mobile social networks[J]. Journal on Communications, 2017,38(10): 81-93.
|
[25] |
GE C , SUSILO W , BAEK J ,et al. A verifiable and fair attribute-based proxy re-encryption scheme for data sharing in clouds[J]. IEEE Transactions on Dependable and Secure Computing, 2021:1.
|
[26] |
GUO H , ZHANG Z , XU J ,et al. Accountable proxy re-encryption for secure data sharing[J]. IEEE Transactions on Dependable and Secure Computing, 2021,18(1): 145-159.
|