[1] |
ARMBRUST M , FOX A , GRIFFITH R , et al. A view of cloud com-puting[J]. Communications of the ACM, 2010,53 (4):50-58.
|
[2] |
SHANIQNG G , YINGPEI Z . Attribute-based signature scheme[A]. Information Security and Assurance[C]. Busan, Korea, 2008.509-511.
|
[3] |
GOYAL V , PANDEY O , SAHAI A , et al. Attribute-based encryption for fine-grained access control of encrypted data[A]. Proceedings of the 13th ACM Conference on Computer and Communications Secu-rity[C]. Alexandria, Virginia, USA, 2006.89-98.
|
[4] |
WATERS B . Ciphertext-policy attribute-based encryption: an expres-sive, efficient, and provably secure realization[A]. Public Key Cryp-tography-PKC 2011[C]. Taormina, Italy, 2011.53-70.
|
[5] |
SAHAI A , WATERS B . Fuzzy identity-based encryption[A]. Ad-vances in Cryptology-EUROCRYPT 2005[C]. Aarhus, Denmark, 2005.457-473.
|
[6] |
YANG P , CAO Z , DONG X . Fuzzy identity based signature[EB/OL]. .
|
[7] |
SHAHANDASHTI S F , SAFAVI-NAINI R . Threshold attribute-based signatures and their application to anonymous credential systems[A]. Progress in Cryptology-AFRICACRYPT 2009[C]. Gammarth, Tunisia, 2009.198-216.
|
[8] |
MAJI H K , PRABHAKARAN M , ROSULEK M . Attribute-based signatures[A]. Topics in Cryptology-CT-RSA 2011[C]. San Francisco, CA, USA, 2011.376-392.
|
[9] |
LI J , AU M H , SUSILO W , et al. Attribute-based signature and its applications[A]. Proceedings of the 5th ACM Symposium on Informa-tion, Computer and Communications Security[C]. Beijing, China, 2010.60-69.
|
[10] |
KHADER D . Attribute based group signatures[EB/OL]. .
|
[11] |
LI J , KIM K . Attribute-based ring signatures[EB/OL]. .
|
[12] |
ATENIESE G , CHOU D H , MEDEIROS B D , et al. Sanitizable sig-natures[A]. Computer Security-ESORICS 2005[C]. Milan, Italy, 2005.159-177.
|
[13] |
ATENIESE G , MEDEIROS B . On the key exposure problem in cha-meleon hashes[A]. 4th International Conference[C]. Amalfi, Italy, 2004.165-179.
|
[14] |
YUEN T H , SUSILO W , LIU J K , et al. Sanitizable signatures revisited[A]. 7th International Conference[C]. Hong-Kong, China, 2008.80-97.
|
[15] |
AGRAWAL S , KUMAR S , SHAREEF A , et al. Sanitizable signatures with strong transparency in the standard model[A]. 5th International Conference[C]. Beijing, China, 2009.93-107.
|
[16] |
CANARD S , JAMBERT A , LESCUYER R . Sanitizable signatures with several signers and sanitizers[A]. 5th International Conference on Cryptology in Africa[C]. Ifrance, Morocco, 2012.35-52.
|
[17] |
GONG J , QIAN H , ZHOU Y . Fully-secure and practical sanitizable signatures[A]. 6th International Conference[C]. Shanghai, China, 2010.300-317.
|
[18] |
BRZUSKA C , FISCHLIN M , FREUDENREICH T , et al. Security of sanitizable signatures revisited[A]. 12th International Conference on Practice and Theory in Public Key Cryptography[C]. Irvine, CA, USA, 2009.317-336.
|
[19] |
IZU T , KUNIHIRO N , OHTA K , et al. A sanitizable signature scheme with aggregation[A]. Third International Conference[C]. Hong Kong, China, 2007.51-64.
|