[1] |
LEWKO A , WATERS B . Decentralizing attribute-based encryption[C]// International Conference Theory and Applications of Cryptographic Techniques. 2011: 568-588.
|
[2] |
XHAFA F , FENG J , ZHANG Y ,et al. Privacy-aware attribute-based PHR sharing with user accountability in cloud computing[J]. Journal of Supercomputing, 2015,71: 1607-1619.
|
[3] |
HAN J , SUSILO W , MU Y ,et al. Improving privacy and security in decentralized ciphertext-policy attribute-based encryption[J]. IEEE Transactions on Information Forensics and Security, 2015,10(3): 665-678.
|
[4] |
陶启, 黄晓芳 . 基于密文策略多机构属性基加密方案[J]. 武汉大学学报(理学版), 2015,61(6): 545-548.
|
|
TAO Q , HUANG X F . Multi-authority ciphertext-policy attribute-based encryption scheme[J]. Journal of Wuhan University (Nature Science Edition), 2015,61(6): 545-548.
|
[5] |
SAHAI A , SEYALIOGLU H , WATERS B . Dynamic credentials and ciphertext delegation for attribute-based encryption[M]. Advances in Cryptology-EUROCRYPT 2012,Springer Berlin Heidelberg, 2012: 199-217.
|
[6] |
YANG K , JIA X H , REN K . Secure and veritiable policy update out-sourcing for big data access control in the cloud[J]. IEEE Transactions on Parallel and Distributed Systems, 2015,26(12): 3461-3470.
|
[7] |
应作斌, 马建峰, 崔江涛 . 支持动态策略更新的半策略隐藏属性加密方案[J]. 通信学报, 2015,36(12): 178-189.
|
|
YING Z B , MA J F , CUI J T . Partially policy hidden CP-ABE sup-porting dynamic policy updating[J]. Journal on Communications, 2015,36(12): 178-189.
|
[8] |
LI H , LIU D X , ALHARBI K ,et al. Enabling fine-grained access control with efficient attribute revocation and policy updating in smart grid[J]. KSII Transactions on Internet and Information Systems, 2015,9(4): 1404-1423.
|
[9] |
QIAN H L , LI J G , ZHANG Y C ,et al. Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation[J]. International Journal of Information Security, 2015,14(6): 487-497.
|
[10] |
吴光强 . 适合云存储的访问策略可更新多中心CP-ABE方案[J]. 计算机研究与发展, 2016,53(10): 2393-2399.
|
|
WU G Q . Multi-authority CP-ABE with policy update in cloud sto-rage[J]. Journal of Computer Research and Development, 2016,53(10): 2393-2399.
|
[11] |
YING Z B , LI H , MA J F ,et al. Adaptively secure ciphertext-policy attribute-based encryption with dynamic policy updating[J]. Science China-Information Sciences, 2016,59(4): 1-16.
|
[12] |
应作斌, 马建峰, 崔江涛 ,等. 支持位置验证和策略变更的属性加密方案[J]. 西安电子科技大学学报(自然科学版), 2017,44(2): 57-62.
|
|
YING Z B , MA J F , CUI J T ,et al. Attribute-based encryption with location verification and policy adjusting supporting the cloud mobile office[J]. Journal of Xidian University (Nature Science Edition), 2017,44(2): 57-62.
|