[13] |
ZHANG Y H , ZHENG D , DENG R H . Security and privacy in smart health:efficient policy-hiding attribute-based access control[J]. IEEE Internet of Things Journal, 2018,5(3): 2130-2145.
|
[14] |
FAN K , XU H Y , GAO L X ,et al. Efficient and privacy preserving access control scheme for fog-enabled IoT[J]. Future Generation Computer Systems, 2019,99: 134-142.
|
[15] |
CUI H , DENG R H , LAI J Z ,et al. An efficient and expressive ciphertext-policy attribute-based encryption scheme with partially hidden access structures,revisited[J]. Computer Networks, 2018,133: 157-165.
|
[16] |
LI Q , ZHANG Y H , ZHANG T ,et al. HTAC:fine-grained policy-hiding and traceable access control in mHealth[J]. IEEE Access, 2020,8: 123430-123439.
|
[17] |
ZHANG P , CHEN Z H , LIANG K T ,et al. A cloud-based access control scheme with user revocation and attribute update[C]// Information Security and Privacy. Cham:Springer, 2016: 525-540.
|
[18] |
LI J G , YAO W , ZHANG Y C ,et al. Flexible and fine-grained attribute-based data storage in cloud computing[J]. IEEE Transactions on Services Computing, 2017,10(5): 785-796.
|
[19] |
ZHANG J W , LI T , OBAIDAT M S ,et al. Enabling efficient data sharing with auditable user revocation for IoV systems[J]. IEEE Systems Journal, 2021,PP(99): 1.
|
[20] |
ZHANG J W , MA J F , LI T ,et al. Efficient hierarchical and time-sensitive data sharing with user revocation in mobile crowdsensing[J]. Security and Communication Networks, 2021,2021: 1-17.
|
[21] |
QIN B D , ZHAO Q L , ZHENG D ,et al. (Dual) server-aided revocable attribute-based encryption with decryption key exposure resistance[J]. Information Sciences, 2019,490: 74-92.
|
[22] |
LIU Z H , DUAN S H , ZHOU P L ,et al. Traceable-then-revocable ciphertext-policy attribute-based encryption scheme[J]. Future Generation Computer Systems, 2019,93: 903-913.
|
[23] |
HAN D Z , PAN N N , LI K C . A traceable and revocable ciphertext-policy attribute-based encryption scheme based on privacy protection[J]. IEEE Transactions on Dependable and Secure Computing, 2020,PP(99): 1.
|
[24] |
LIU J K , YUEN T H , ZHANG P ,et al. Time-based direct revocable ciphertext-policy attribute-based encryption with short revocation list[C]// Applied Cryptography and Network Security. Berlin:Springer, 2018: 516-534.
|
[1] |
ZHANG J W , MA J F , MA Z ,et al. Efficient hierarchical data access control for resource-limited users in cloud-based e-health[C]// Proceedings of 2019 International Conference on Networking and Network Applications (NaNA). Piscataway:IEEE Press, 2019: 319-324.
|
[2] |
MIAO Y B , WENG J , LIU X M ,et al. Enabling verifiable multiple keywords search over encrypted cloud data[J]. Information Sciences, 2018,465: 21-37.
|
[3] |
MIAO Y B , DENG R H , LIU X M ,et al. Multi-authority attribute-based keyword search over encrypted cloud data[J]. IEEE Transactions on Dependable and Secure Computing, 2021,18(4): 1667-1680.
|
[4] |
ISLAM M A , MADRIA S . Attribute-based encryption scheme for secure multi-group data sharing in cloud[J]. IEEE Transactions on Services Computing, 2020,PP(99): 1.
|
[5] |
ZHANG Z T , ZENG P , PAN B F ,et al. Large-universe attribute-based encryption with public traceability for cloud storage[J]. IEEE Internet of Things Journal, 2020,7(10): 10314-10323.
|
[6] |
QI S Y , LU Y S , ZHENG Y Q ,et al. CPDS:enabling compressed and private data sharing for industrial Internet of things over blockchain[J]. IEEE Transactions on Industrial Informatics, 2021,17(4): 2376-2387.
|
[7] |
HOHENBERGER S , WATERS B . Online/offline attribute-based encryption[C]// International Workshop on Public Key Cryptography. Berlin:Springer, 2014: 293-310.
|
[8] |
ROUSELAKIS Y , WATERS B . Practical constructions and new proof methods for large universe attribute-based encryption[C]// Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security. New York:ACM Press, 2013: 463-474.
|
[9] |
JOSHI M , JOSHI K , FININ T . Attribute based encryption for secure access to cloud based EHR systems[C]// Proceedings of 2018 IEEE 11th International Conference on Cloud Computing (CLOUD). Piscataway:IEEE Press, 2018: 932-935.
|
[10] |
LIU Z C , JIANG Z L , WANG X ,et al. Practical attribute-based encryption:outsourcing decryption,attribute revocation and policy updating[J]. Journal of Network and Computer Applications, 2018,108: 112-123.
|
[11] |
FAN W J , LI F , CHEN X W ,et al. Deploying parallelised ciphertext-policy attributed-based encryption in clouds[J]. International Journal of Computational Science and Engineering, 2018,16(3): 321.
|
[12] |
NING J T , CAO Z F , DONG X L ,et al. Auditable $\sigma $ -time outsourced attribute-based encryption for access control in cloud computing[J]. IEEE Transactions on Information Forensics and Security, 2018,13(1): 94-105.
|
[25] |
DE CARO A , IOVINO V . JPBC:Java pairing based cryptography[C]// Proceedings of 2011 IEEE Symposium on Computers and Communications (ISCC). Piscataway:IEEE Press, 2011: 850-855.
|