[1] |
DU M X , WANG Q , HE M Q ,et al. Privacy-preserving indexing and query processing for secure dynamic cloud storage[J]. IEEE Transactions on Information Forensics and Security, 2018,13(9): 2320-2332.
|
[2] |
SAHAI A , WATERS B . Fuzzy identity-based encryption[C]// 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Berlin:Springer, 2005: 457-473.
|
[3] |
GOYAL V , PANDEY O , SAHAI A ,et al. Attribute-based encryption for fine-grained access control of encrypted data[C]// Proceedings of the 13th ACM Conference on Computer and Communications Security. New York:ACM Press, 2006: 89-98.
|
[4] |
BETHENCOURT J , SAHAI A , WATERS B . Ciphertext-policy attribute-based encryption[C]// 2007 IEEE Symposium on Security and Privacy. Piscataway:IEEE Press, 2007: 321-334.
|
[5] |
WATERS B , . Ciphertext-policy attribute-based encryption:an expressive,efficient,and provably secure realization[C]// International Workshop on Practice and Theory in Public Key Cryptography. Berlin:Springer, 2011: 53-70.
|
[6] |
XUE K P , XUE Y J , HONG J N ,et al. RAAC:robust and auditable access control with multiple attribute authorities for public cloud storage[J]. IEEE Transactions on Information Forensics and Security, 2017,12(4): 953-967.
|
[7] |
LI W , XUE K P , XUE Y J ,et al. TMACS:a robust and verifiable threshold multi-authority access control system in public cloud storage[J]. IEEE Transactions on Parallel and Distributed Systems, 2016,27(5): 1484-1496.
|
[8] |
XUE K P , CHEN W K , LI W ,et al. Combining data owner-side and cloud-side access control for encrypted cloud storage[J]. IEEE Transactions on Information Forensics and Security, 2018,13(8): 2062-2074.
|
[9] |
PACI F , SQUICCIARINI A , ZANNONE N . Survey on access control for community-centered collaborative systems[J]. ACM Computing Surveys, 2018,51(1): 1-38.
|
[10] |
SHAMIR A . How to share a secret[J]. Communications of the ACM, 1979,22(11): 612-613.
|
[11] |
TASSA T . Hierarchical threshold secret sharing[J]. Journal of Cryptology, 2007,20(2): 237-264.
|
[12] |
SUSILO W , JIANG P , GUO F C ,et al. EACSIP:extendable access control system with integrity protection for enhancing collaboration in the cloud[J]. IEEE Transactions on Information Forensics and Security, 2017,12(12): 3110-3122.
|
[13] |
XUE Y J , XUE K P , GAI N ,et al. An attribute-based controlled collaborative access control scheme for public cloud storage[J]. IEEE Transactions on Information Forensics and Security, 2019,14(11): 2927-2942.
|
[14] |
HUMBERT M , TRUBERT B , HUGUENIN K . A survey on interdependent privacy[J]. ACM Computing Surveys, 2020,52(6): 1-40.
|
[15] |
房梁, 殷丽华, 郭云川 ,等. 基于属性的访问控制关键技术研究综述[J]. 计算机学报, 2017,40(7): 1680-1698.
|
|
FANG L , YIN L H , GUO Y C ,et al. A survey of key technologies in attribute-based access control scheme[J]. Chinese Journal of Comput-ers, 2017,40(7): 1680-1698.
|
[16] |
ATTRAPADUNG N , IMAI H . Conjunctive broadcast and attribute-based encryption[C]// 3rd International Conference on Pairing-Based Cryptography. Berlin:Springer, 2009: 248-265.
|
[17] |
LIU J K , YUEN T H , ZHANG P ,et al. Time-based direct revocable ciphertext-policy attribute-based encryption with short revocation list[C]// 16th International Conference on Applied Cryptography and Network Security. Berlin:Springer, 2018: 516-534.
|
[18] |
YEH L Y , CHIANG P Y , TSAI Y L ,et al. Cloud-based fine-grained health information access control framework for lightweight IoT devices with dynamic auditing and attribute revocation[J]. IEEE Transactions on Cloud Computing, 2018,6(2): 532-544.
|
[19] |
HAO J L , HUANG C , LIU J ,et al. Efficient outsourced data access control with user revocation for cloud-based IoT[C]// 2018 IEEE Global Communications Conference. Piscataway:IEEE Press, 2018: 1-6.
|
[20] |
HUR J , NOH D K . Attribute-based access control with efficient revocation in data outsourcing systems[J]. IEEE Transactions on Parallel and Distributed Systems, 2011,22(7): 1214-1221.
|
[21] |
LI M T , HUANG X Y , LIU J K ,et al. GO-ABE:group-oriented attribute-based encryption[M]. Cham: Springer International Publishing, 2014.
|
[22] |
YEH S C , SU M Y , CHEN H H ,et al. An efficient and secure approach for a cloud collaborative editing[J]. Journal of Network and Computer Applications, 2013,36(6): 1632-1641.
|
[23] |
史姣丽, 黄传河, 王晶 ,等. 云存储下多用户协同访问控制方案[J]. 通信学报, 2016,37(1): 88-99.
|
|
SHI J L , HUANG C H , WANG J ,et al. Multi-user collaborative access control scheme in cloud storage[J]. Journal on Communications, 2016,37(1): 88-99.
|
[24] |
ILIA P , CARMINATI B , FERRARI E ,et al. SAMPAC:Socially-aware collaborative multi-party access control[C]// 7th ACM on Conference on Data and Application Security and Privacy. New York:ACM Press, 2017: 71-82.
|
[25] |
HUANG Q L , LI N , YANG Y X . DACSC:dynamic and fine-grained access control for secure data collaboration in cloud computing[C]// 2018 IEEE Global Communications Conference. Piscataway:IEEE Press, 2018: 1-7.
|
[26] |
LI C H , XIE W R , ZHOU K . Efficient binary-encoding access control policy combination for large-scale collaborative scenarios[C]// 2018 17th IEEE International Conference on Trust,Security and Privacy in Computing and Communications/ 12th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE) . Piscataway:IEEE Press, 2018: 560-566.
|
[27] |
BOBBA R , KHURANA H , PRABHAKARAN M . Attribute-sets:a practically motivated enhancement to attribute-based encryption[C]// 14th European Conference on Research in Computer Security. Berlin:Springer, 2009: 587-604.
|
[28] |
王光波, 刘海涛, 王晨露 ,等. 云存储环境下可撤销属性加密[J]. 计算机研究与发展, 2018,55(6): 76-86.
|
|
WANG G B , LIU H T , WANG C L ,et al. Revocable attribute-based encryption in cloud storage[J]. Journal of Computer Research and De-velopment, 2018,55(6): 76-86.
|
[29] |
NAOR D , NAOR M , LOTSPIECH J . Revocation and tracing schemes for stateless receivers[C]// 21st Annual International Cryptology Conference. Berlin:Springer, 2001: 41-62.
|