[1] |
SHAMIR A . Identity based cryptosystems and signature schemes[A]. Advances in Cryptology-Crypto 1984,Lecture Notes in Computer Science[C]. 1984. 47-53.
|
[2] |
SAHAI A , WATERS B . Fuzzy identity-based encryption[A]. Advances in Cryptology-EUROCRYPT 2005[C]. Berlin,Heidelberg: SpringerVerlag, 2005. 457-473.
|
[3] |
冯登国, 陈成 . 属性密码学研究[J]. 密码学报, 2014,1(1): 1-12. FENG D G , CHEN C . Research on attribute-based cryptography[J]. Journal of Cryptologic Research, 2014,1(1): 1-12.
|
[4] |
MATT B , GERRIT B , MARTIN S . Divertible protocols and atomic proxy cryptography[A]. EUROCRYPT1998[C]. 1998. 127-144.
|
[5] |
TABAN G A A C′ , GLIGOR V D . Towards a secure and interoperable DRM architecture[A]. Proceedings of the 6th ACM Workshop on Digital Rights Management[C]. 2006. 69-78.
|
[6] |
闫玺玺, 马兆丰, 杨义先 , 等. 多域环境下基于代理重加密的电子文档分发协议[J]. 北京邮电大学学报, 2012,35(5): 81-84. YAN X X , MA Z F , YANG Y X , et al. A distribution protocol based on proxy re-encryption in domain environment of E-document management[J]. Journal of Beijing University of Posts and Telecommunications, 2012,35(5): 81-84.
|
[7] |
MATTHEW P , PATRICK T , PATRICK M , BRENT W . Secure attribute-based systems[J]. Journal of Computer Security, 2010,18(5): 799-837.
|
[8] |
YU S C , WANG C , REN K . Attribute based data sharing with attribute revocation[A]. Proc of the ASIAN ACM Conf on Computer and Communications Security (ASIACCS 2010)[C]. New York, 2010. 262-270.
|
[9] |
LIU Q , WANG G J , WU J . Time-based proxy re-encryption scheme for secure data sharing in a cloud environment[J]. Information sciences, 2014,(258): 355-370.
|
[10] |
李强, 冯登国, 张立武 , 等. 标准模型下增强的基于属性的认证密钥协商协议[J]. 计算机学报, 2013,36(10): 2156-2166. LI Q , FENG D G , ZHANG L W , et al. Enhanced attribute-based authenticated key agreement protocol in the standard model[J]. Chinese Journal of Computers, 2013,36(10): 2156-2166.
|
[11] |
余敏达 . 基于属性的加密体制研究与实现[D]. 济南:山东大学, 2013. YU M D . Research and Implementation on Attribute-Based Encryption[D]. Jinan:Shandong University, 2013.
|
[12] |
苏金树, 曹丹, 王小峰 , 等. 属性基加密机制[J]. 软件学报, 2011,22(6): 1299-1315. SU J S , CAO D , WANG X F , et al. Attribute based encryption schemes[J]. Journal of Software, 2011,22(6): 1299-1315.
|
[13] |
宋衍, 韩臻, 刘凤梅 , 等. 基于访问树的策略隐藏属性加密方案[J]. 通信学报, 2015,36(9): 119-126. SONG Y , HAN Z , LIU F M , et al. Attribute-based encryption with hidden policies in the access tree[J]. Journal on Communications, 2015,36(9): 119-126.
|
[14] |
SHAMIR A . How to share a secret[J]. Communications of the ACM, 1979,22(11): 612-613.
|
[15] |
周德华 . 代理重加密体制的研究[D]. 上海:上海交通大学, 2013. ZHOU D H . Studies on Proxy Re-Encryption Schemes[D]. Shanghai:Shanghai Jiao Tong University, 2013.
|
[16] |
陈燕利, 杜英杰, 杨庚 . 一种高效的基于属性的认证密钥协商协议[J]. 计算机科学, 2014,41(4): 150-177. CHEN Y L , DU Y J , YANG G . Efficient attribute-based authenticated key agreement protocol[J]. Computer Science, 2014,41(4): 150-154.
|