[1] |
SAHAI A , WATERS B R . Fuzzy identity-based encryption[C]// 24th Annual International Conference on Theory and Applications of Cryptographic Techniques. 2004: 457-473.
|
[2] |
LI H , YANG Y , DAI Y ,et al. Achieving secure and efficient dynamic searchable symmetric encryption over medical cloud data[J]. IEEE Transactions on Cloud Computing, 2020,8(2): 484-494.
|
[3] |
LI H , LIU D , DAI Y ,et al. Personalized search over encrypted data with efficient and secure updates in mobile clouds[J]. IEEE Transactions on Emerging Topics in Computing, 2018,6(1): 97-109.
|
[4] |
WANG S , ZHANG Y , ZHANG Y . A blockchain-based framework for data sharing with fine-grained access control in decentralized storage systems[J]. IEEE Access, 2018,6: 38437-38450.
|
[5] |
GOYAL V , PANDEY O , SAHAI A ,et al. Attribute-based encryption for fine-grained access control of encrypted data[C]// 13th ACM conference on Computer and Communications Security. 2006: 89-98.
|
[6] |
BETHENCOURT J , SAHAI A , WATERS B . Ciphertext-policy attribute-based encryption[C]// 2007 IEEE Symposium on Security and Privacy (SP '07). 2007: 321-334.
|
[7] |
ZHANG Y , ZHENG D , DENG R H . Security and privacy in smart health:Efficient policy-hiding attribute-based access control[J]. IEEE Internet Things, 2018,5(3): 2130-2145.
|
[8] |
WU A , ZHANG Y , ZHENG X ,et al. Efficient and privacy-preserving traceable attribute-based encryption in blockchain[J]. Ann.Telecommun., 2019,74(7-8): 401-411.
|
[9] |
MIAO Y , MA J , LIU X ,et al. Lightweight fi-ne-grained search over encrypted data in fog computing[J]. IEEE Transactions on Services Computing, 2019,12(5): 772-785.
|
[10] |
CHASE M , . Multi-authority attribute-based encryption[C]// Proceedings of Cryptography Conference on Theory of Cryptography (TCC'07). 2007: 515-534.
|
[11] |
LIN H , CAO Z F , LIANG X . Secure threshold multi-authority attribute-based encryption without a central authority[C]// Proceedings of International Conference on Cryptology. 2008: 426-436.
|
[12] |
LEWKO A , WATERS B . Decentralizing attribute-based encryption[C]// Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques. 2011: 568-588.
|
[13] |
QIAN H L , LI J G , ZHANG Y C ,et al. Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation[J]. International Journal of Information Security, 2015(14): 487-497.
|
[14] |
ZHONG H , ZHU W , XU Y ,et al. Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage[J]. Soft Computing A Fusion of Foundations Methodologies &Applicaitons, 2018,22(1): 243-251.
|
[15] |
YAN X , LIU Y , LI Z ,et al. Multi-authority attribute-based encryption scheme with policy dynamic updating[J]. Journal on Communications, 2017,38(10): 94-101.
|
[16] |
ZHANG P , CHEN Z , LIU J K ,et al. An efficient access control scheme with outsourcing capability and attribute update for fog computing[J]. Future Generation Computer Systems, 2018,78: 753-762.
|
[17] |
DI FRANCESCO MAESA D , MORI P , RICCI L . A blockchain based approach for the definition of auditable access control systems[J]. Computers & Security, 2019,84: 93-119.
|
[18] |
LI R , SONG T , MEI B ,et al. Blockchain for large-scale internet of things data storage and protection[J]. IEEE Transactions on Services Computing, 2019,12(5): 762-771.
|
[19] |
DORRI A , KANHERE S S , JURDAK R ,et al. Blockchain for IoT security and privacy:The case study of a smart home[C]// 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops). 2017: 618-623.
|
[20] |
DING S , CAO J , LI C ,et al. A novel attribute-based access control scheme using blockchain for IoT[J]. IEEE Access, 2019,7: 38431-38441.
|
[21] |
MAESA D D F , MORI P , RICCI L . Blockchain based access control[C]// 2017 IFIP International Conference on Distributed Applications and Interoperable Systems. 2017: 206-220.
|
[22] |
LAI J , DENG R H , LI Y . Fully secure cyphertext-policy hiding CP-ABE[C]// 2011 International Conference on Information Security Practice and Experience. 2011: 24-39.
|
[23] |
WANG H , NING J , HUANG X ,et al. Secure fine-grained encrypted keyword search for e-healthcare cloud[C]// IEEE Transactions on Dependable and Secure Computing. 2021: 1307-13019.
|
[24] |
CUI H , DENG R H , WU G ,et al. An efficient and expressive ciphertext-policy attribute-based encryption scheme with partially hidden access structures[C]// 2016 International Conference on Provable Security. 2016: 19-38.
|
[25] |
YANG K , HAN Q , LI H ,et al. An efficient and fine-grained big data access control scheme with privacy-preserving policy[J]. IEEE Internet Things, 2017,4(2): 563-571.
|
[26] |
NISHIDE T , YONEYAMA K , OHTA K . Attribute-based encryption with partially hidden encryptor-specified access structures[C]// 2008 International Conference on Applied Cryptography and Network Security. 2008: 111-129.
|
[27] |
HUR J . Attribute-based secure data sharing with hidden policies in smart grid[J]. IEEE Transactions on Parallel\& Distributed Systems, 2013,24(11): 2171-2180.
|
[28] |
QI H , YING H Z , HUI L . Efficient and robust attribute-based encryption supporting access policy hiding in Internet of Things[J]. Future Generation Computer Systems, 2018,83: 269-277.
|
[29] |
WANG Y , FAN K . Effective CP-ABE with hidden access policy[J]. Journal of Computer Research and Development, 2019,56(10): 2151-2159.
|
[30] |
LIU Y , DU R . Efficient partially policy-hidden with multi-authority for access control scheme in Internet of Things[C]// 2020 International Conference on Networking and Network Applications (NaNA). 2020: 375-380.
|
[31] |
YANG K , JIA X , REN K . Secure and verifiable policy update out-sourcing for big data access control in the cloud[J]. IEEE Transactions on Parallel and Distributed Systems, 2015,26(12): 3461-3470.
|
[32] |
LIU D , LI H , YANG Y ,et al. Achieving multi-authority access control with efficient attribute revocation in smart grid[C]// 2014 IEEE Inter-national Conference on Communications. 2014: 634-639.
|
[33] |
HUANG X F , TAO Q , QIN B D ,et al. Multi-authority attribute based encryption scheme with revocation[C]// 2015 IEEE International Conference on Computer Communication & Networks. 2015: 1-5.
|
[34] |
田有亮, 杨科迪, 王缵 ,等. 基于属性加密的区块链数据溯源算法[J]. 通信学报, 2019,40(11): 101-111.
|
|
TIAN Y L , YANG K D , WANG Z ,et al. Algorithm of blockchain data provenance based on ABE[J]. Journal on Communications, 2019,40(11): 101-111.
|