[1] |
SAHAI A , WATERS B . Fuzzy identity-based encryption[A]. Cryptol-ogy-EUROCRYPT 2005[C]. Berlin, Heidelberg: Springer-Verlag, 2005. 457-473.
|
[2] |
MIHAELA I , GIOVANNI R , BRUNO C . Design and implementation of a confidentiality and access control solution for publish/subscribe systems[J]. Computer networks, 2012,56(7): 2014-2037.
|
[3] |
MUNTES M V , NIN J . Privacy and anonymization for very large datasets[A]. Proc of the ACM 18th Int'l Conf on Information and Knowledge Management,CIKM 2009[C]. New York: Association for Computing Machinery, 2009. 2117-2118.
|
[4] |
WAN Z G , LIU J E , ROBERT H D . HASBE: a hierarchical attrib-ute-based solution for flexible and scalable access control in cloud computing[J]. IEEE Transactions on Information Forensics and Secu-rity, 2012,7(2): 743-754.
|
[5] |
NUTTAPONG A , JAVIER H , FABIEN L . Attribute-based encryption schemes with constant-size ciphertexts[J]. Theoretical computer sci-ence, 2012,422(9): 15-38.
|
[6] |
WANG Y T , CHEN K F , LONG Y . Attribute-based traitor tracing[J]. Journal of Information Science and Engineering, 2011,27(1): 181-195.
|
[7] |
WANG Y T , CHEN K F , LONG Y . Accountable authority key policy attribute-based encryption[J]. Science China, 2012,55(7): 1631-1638.
|
[8] |
CRAMPTON J , MARTIN K , WILD P . On key assignment for hierar-chical access control[J]. Proc of the 19th IEEE Computer Security Foundations Workshop—CSFW 2006[C]. Venice, 2006. 5-7.
|
[9] |
MALEK B , MIRI A . Combining attribute-based and access sys-tems[J]. Proc of IEEE CSE2009, the 12th IEEE Int'l Conf on Com-putational Science and Engineering IEEE Computer Society[C] 2009. 305-312.
|
[10] |
BONEH D , FRANKLIN M . Identity-based encryption from the Weil pairing[J]. SIAM Journal on Computing, 2003,32(3): 586-615.
|
[11] |
IBRAMI L , PETKOVIC M , NIKOVA S , et al. Ciphertext-Policy Attribute-Based Threshold Decryption with Flexible Delegation and Revocation of User Attributes[R]. Centre for Telematics and Informa-tion Technology, University of Twente, 2009.
|
[12] |
ROY S , CHUAH M . Secure Data Retrieval Based on Ciphertext Pol-icy Attribute-Based Encryption(CP-ABE) System for the DTN[R]. 2009.
|
[13] |
BLAZE M , BLEUMER G , STRAISS M . Divertible protocols and atomic proxy cryptography[A]. EUROCRYPT1998[C]. 1998. 127-144.
|
[14] |
闫玺玺, 马兆丰, 杨义先 等. 多域环境下基于代理重加密的电子文档分发算法及协议分析[J]. 北京邮电大学学报, 2012,35(5):81-84. YAN X X , MA Z F , YANG Y X , et al. A distribution protocol based on proxy re-encryption in domain environment of E-document manage-ment[J]. Journal of Beijing University of Posts and Telecommunica-tions, 2012,35(5):81-84
|