[1] |
SAHAI A , WATERS B . Fuzzy identity-based encryption[C]// The 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Berlin:Springer, 2005: 457-473.
|
[2] |
GOYAL V , PANDEY O , SAHAI A ,et al. Attribute-based encryption for fine-grained access control of encrypted data[C]// The 13th ACM Conference on Computer and Communications Security. New York:ACM Press, 2006: 89-98.
|
[3] |
齐芳, 李艳梅, 汤哲 . 可撤销和可追踪的密钥策略属性基加密方案[J]. 通信学报, 2018,39(11): 63-69.
|
|
QI F , LI Y M , TANG Z . Revocable and traceable key-policy attribute-based encryption scheme[J]. Journal on Communications, 2018,39(11): 63-69.
|
[4] |
李学俊, 张丹, 李晖 . 可高效撤销的属性基加密方案[J]. 通信学报, 2019,40(6): 32-39.
|
|
LI X J , ZHANG D , LI H . Efficient revocable attribute-based encryption scheme[J]. Journal on Communications, 2019,40(6): 32-39.
|
[5] |
于金霞, 何旭, 闫玺玺 . 机构可验证的密文策略属性基加密方案[J]. 西安电子科技大学学报, 2019,46(4): 49-57.
|
|
YU J X , HE X , YAN X X . Ciphertext-policy attribute-based encryption scheme with verifiability on authority[J]. Journal of Xidian University, 2019,46(4): 49-57.
|
[6] |
JIANG Y , SUSILO W , MU Y ,et al. Ciphertext-policy attribute-based encryption with key-delegation abuse resistance[C]// The 21st Australasian Conference on Information Security and Privacy. Berlin:Springer, 2016: 477-494.
|
[7] |
JIANG Y , SUSILO W , MU Y ,et al. Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing[J]. Future Generation Computer Systems, 2018,78(2): 720-729.
|
[8] |
LIU Z , CAO Z , WONG D S . White-box traceable ciphertext-policy attribute-based encryption supporting any monotone access structures[J]. IEEE Transactions on Information Forensics and Security, 2013,8(1): 76-88.
|
[9] |
ROUSELAKIS Y , WATERS B . Practical constructions and new proof methods for large universe attribute-based encryption[C]// The 2013 ACM SIGSAC Conference on Computer and Communications Security. New York:ACM Press, 2013: 463-474.
|
[10] |
BONEH D , BOYEN X . Short signatures without random oracles[C]// The International Conference on the Theory and Applications of Cryptographic Techniques. Berlin:Springer, 2004: 56-73.
|
[11] |
NING J , CAO Z , DONG X ,et al. Large universe ciphertext-policy attribute-based encryption with white-box traceability[C]// The 19th European Symposium on Research in Computer Security. Berlin:Springer, 2014: 55-72.
|
[12] |
YU S , REN K , LOU W ,et al. Defending against key abuse attacks in KP-ABE enabled broadcast systems[C]// The 5th International Conference on Security and Privacy in Communication Networks. Berlin:Springer, 2009: 311-329.
|
[13] |
张星, 文子龙, 沈晴霓 ,等. 可追责并解决密钥托管问题的属性基加密方案[J]. 计算机研究与发展, 2015,52(10): 2293-2303.
|
|
ZHANG X , WEN Z L , SHEN Q N ,et al. Accountable attribute-based encryption scheme without key escrow[J]. Journal of Computer Research and Development, 2015,52(10): 2293-2303.
|
[14] |
NING J , DONG X , CAO Z ,et al. Accountable authority ciphertext-policy attribute-based encryption with white-box traceability and public auditing in the cloud[C]// The 20th European Symposium on Research in Computer Security. Berlin:Springer, 2015: 270-289.
|
[15] |
YU G , MA X , CAO Z ,et al. Accountable multi-authority ciphertext-policy attribute-based encryption without key escrow and key abuse[C]// The 9th International Symposium on Cyberspace Safety and Security. Berlin:Springer, 2017: 337-351.
|
[16] |
ZHANG Y , LI J , ZHENG D ,et al. Towards privacy protection and malicious behavior traceability in smart health[J]. Personal and Ubiquitous Computing, 2017,21(5): 815-830.
|
[17] |
LAI J , TANG Q . Making any attribute-based encryption accountable,efficiently[C]// The 23rd European Symposium on Research in Computer Security. Berlin:Springer, 2018: 527-547.
|
[18] |
LI Q , ZHU H , YING Z ,et al. Traceable ciphertext-policy attributebased encryption with verifiable outsourced decryption in eHealth cloud[J]. Wireless Communications and Mobile Computing, 2018(1):1701675.
|
[19] |
QIAO H , REN J , WANG Z ,et al. Compulsory traceable ciphertext-policy attribute-based encryption against privilege abuse in fog computing[J]. Future Generation Computer Systems, 2018,88(1): 107-116.
|
[20] |
CARO A D , IOVINO V . jPBC:Java pairing based cryptography[C]// The 16th IEEE Symposium on Computers and Communications. Piscataway:IEEE Press, 2011: 850-855.
|