[13] |
SAHAI A , SEYALIOGLU H , WATERS B . Dynamic credentials and ciphertext delegation for attribute-based encryption[J]. Lecture Notes in Computer Science, 2012: 199-217.
|
[14] |
YANG K , JIA X , REN K . Secure and verifiable policy update outsourcing for big data access control in the cloud[J]. IEEE Transactions on Parallel and Distributed Systems, 2015,26(12): 3461-3470.
|
[15] |
LIU D , LI H , YANG Y ,et al. Achieving multi-authority access control with efficient attribute revocation in smart grid[C]// IEEE International Conference on Communications. IEEE, 2014.
|
[16] |
HUANG X F , TAO Q , QIN B D ,et al. Multi-authority attribute based encryption scheme with revocation[C]// IEEE International Conference on Computer Communication & Networks. IEEE, 2015: 1-5.
|
[17] |
LIU Z , CAO Z . On efficiently transferring the linear secret-sharing scheme matrix in ciphertext-policy attribute-based encryption[J]. IACR Cryptology ePrint Archive, 2010.
|
[18] |
BEIMEL A . Secure schemes for secret sharing and key distribution[D]. Haifa,Israel:Institute of Technology, 1996.
|
[1] |
RAMACHANDRAN A , KANTARCIOGLU M . Smart provenance:a distributed,blockchain based data provenance system[C]// Eighth ACM Conference on Data and Application Security and Privacy. ACM, 2018: 35-42.
|
[2] |
TOSH D K , SHETTY S , LIANG X ,et al. Consensus protocols for blockchain-based data provenance:challenges and opportunities[C]// Ubiquitous Computing,Electronics & Mobile Communication Conference. IEEE, 2018.
|
[3] |
WU S H , DU J . Electronic medical record security sharing model based on blockchain[C]// International Conference on Cryptography,Security and Privacy. ACM, 2019: 3-17.
|
[4] |
WANG R , TSAI W T , HE J ,et al. A medical data sharing platform based on permissioned blockchains[C]// International Conference on Blockchain Technology and Application. ACM, 2018: 12-16.
|
[5] |
LEI X , SHAH N , LIN C ,et al. Enabling the sharing economy:privacy respecting contract based on public blockchain[C]// ACM Workshop on Blockchain. ACM, 2017.
|
[6] |
ZHANG Y , WU S , JIN B ,et al. A blockchain-based process provenance for cloud forensics[C]// International Conference on Computer and Communications. IEEE, 2017: 2470-2473.
|
[7] |
BHUIYAN M Z A , ZAMAN A , WANG T ,et al. Blockchain and big data to transform the healthcare[C]// International Conference on Data Processing and Applications. ACM, 2018: 62-68.
|
[8] |
NEISSE R , STERI G,NAI-FOVINO I . A blockchain-based approach for data accountability and provenance tracking[C]// International Conference on Availability,Reliability and Security. ACM, 2017: 1-10.
|
[9] |
SAHAI A , WATERS B R . Fuzzy identity based encryption[C]// 24th Annual International Conference on Theory and Applications of Cryptographic Techniques. Springer Berlin Heidelberg, 2004: 457-473.
|
[10] |
GOYAL V , PANDEY O , SAHAI A ,et al. Attribute-based encryption for fine-grained access control of encrypted data[C]// 13th ACM Conference on Computer and Communications Security. ACM, 2006: 89-98.
|
[11] |
BETHENCOURT J , SAHAI A , WATERS B . Ciphertext-policy attribute-based encryption[C]// The 2007 IEEE Symposium on Security and Privacy. IEEE Computer Society, 2007: 321-334.
|
[12] |
WATERS B , . Ciphertext-policy attribute-based encryption:an expressive,efficient,and provably secure realization[C]// 14th International Conference on Practice and Theory in Public Key Cryptography Conference on Public Key Cryptography. Heidelberg, 2011: 53-70.
|