[1] |
BELLARE M , KEELVEEDH S . Interactive message-locked encryption and secure deduplication[C]// Public-Key cryptography PKC 2015:18th ICAR International Conference on Practice and Theory in Public Key Cryptography. 2015: 516-538.
|
[2] |
AHAMED N , DURAIPANDIAN N . Secured data storage using deduplication in cloud computing based on elliptic curve cryptography[J]. Tech Science Press, 2022,41: 83-94.
|
[3] |
CHEN R , MU Y , YANG G ,et al. BL-MLE:block-level message-locked encryption for secure large file deduplication[J]. IEEE Transactions on Information Forensics & Security, 2015,10(12): 2643-2652.
|
[4] |
ZHAO Y , CHOW S . Updatable block-level message-locked encryption[J]. IEEE Transactions on Dependable and Secure Computing, 2021,18(4): 1620-1631.
|
[5] |
GOYAL V , PANDEY O , SAHAI A ,et al. Attribute-based encryption for fine-grained access control of encrypted data[C]// Proceedings of the 13th ACM Conference on Computer and Communications Security. 2006: 89-98.
|
[6] |
EMURA K , MIYAJI A , OMOTE K ,et al. A ciphertext-policy attribute-based encryption scheme with constant ciphertext length[J]. International Journal of Applied Cryptography, 2009,2(1): 46-59.
|
[7] |
CUI H , DENG R , LI Y ,et al. Attribute-based storage supporting secure deduplication of encrypted data in cloud[J]. IEEE Transactions on Big Data, 2019,5(3): 330-342.
|
[8] |
GOYAL V , JAIN A , PANDEY O ,et al. Bounded ciphertext policy attribute based encryption[C]// 35th International Colloquium on Automata,Languages and Programming (ICALP 2008). 2008: 579-591.
|
[9] |
WATERS B . Ciphertext-policy attribute-based encryption:an expressive,efficient,and provably secure realization[C]// Public Key Cryptography-PKC 2011. 2011: 53-70.
|
[10] |
GONZALEZ-MANZANO L , ORFILA A . An efficient confidentiality-preserving proof of ownership for deduplication[J]. Journal of Network & Computer Applications, 2015,50(4): 49-59.
|
[11] |
HUANG K , ZHANG X S , MU Y ,et al. Bidirectional and malleable proof-of-ownership for large file in cloud storage[J]. IEEE Transactions on Cloud Computing, 2021(99): 1.
|
[12] |
CHEN Y , HU Y , ZHU M ,et al. Attribute-based keyword search with proxy re-encryption in the cloud[J]. IEICE Transactions on Communications, 2018,(8): 1798-1808.
|
[13] |
刘尚, 郭银章 . 云计算多授权中心 CP-ABE 代理重加密方案[J]. 网络与信息安全学报, 2022,8(3): 176-188.
|
|
LIU S , GUO Y Z . Multi-authority based CP-ABE proxy re-encryption scheme for cloud computing[J]. Chinese Journal of Network and Information Security, 2022,8(3): 176-188.
|
[14] |
BONEH D , FRANKLIN M . Identity-based encryption from the Weil pairing[J]. SIAM Journal on Computing, 2003,32(3): 586-615.
|
[15] |
SZYDLO M ,LECTURE NOTES IN COMPUTER SCIENCE 3027. Merkle Tree Traversal in Log Space and Time[C]// 2004 International Conference on the Theory and Application of Cryptographic Techniques (EUROCRYPT 2004). 2004: 541-554.
|
[16] |
ROUSELAKIS Y , WATERS B . New constructions and proof methods for large universe attribute-based encryption[C]// ACM Sigsac Conference on Computer & Communications Security. 2013: 463-474.
|
[17] |
ROUSELAKIS Y , WATERS B . New constructions and proof methods for large universe attribute-based encryption[C]// Sigsac Conference on Computer & Communications Security. 2013.
|