[1] |
BERTRAND Y , BOUDAOUD K , RIVEILL M . What do you think about your company’s leaks? A survey on end-users perception toward data leakage mechanisms[J]. Frontiers in Big Data, 2020,8: 568257.
|
[2] |
BETHENCOURT J , SAHAI A , WATERS B . Ciphertext-policy attribute-based encryption[C]// Proceedings of 2007 IEEE Symposium on Security and Privacy. Piscataway:IEEE Press, 2007: 321-334.
|
[3] |
BUTUN I , ?STERBERG P , . A review of distributed access control for blockchain systems towards securing the Internet of things[J]. IEEE Access, 2021,9: 5428-5441.
|
[4] |
XU G W , LI H W , DAI Y S ,et al. Enabling efficient and geometric range query with access control over encrypted spatial data[J]. IEEE Transactions on Information Forensics and Security, 2019,14(4): 870-885.
|
[5] |
BOURAS M A , XIA B M , ABUASSBA A O ,et al. IoT-CCAC:a blockchain-based consortium capability access control approach for IoT[J]. PeerJ Computer Science, 2021,7:e455.
|
[6] |
SHAFEEQ S , ALAM M , KHAN A . Privacy aware decentralized access control system[J]. Future Generation Computer Systems, 2019,101: 420-433.
|
[7] |
ZHANG Y C , LI J G , YAN H . Constant size ciphertext distributed CP-ABE scheme with privacy protection and fully hiding access structure[J]. IEEE Access, 2019,7: 47982-47990.
|
[8] |
YU J X , HE G H , YAN X X ,et al. Outsourced ciphertext-policy attribute-based encryption with partial policy hidden[C]// Information Security and Cryptology. Berlin:Springer, 2019: 448-467.
|
[9] |
SAINI A , ZHU Q Y , SINGH N ,et al. A smart-contract-based access control framework for cloud smart healthcare system[J]. IEEE Internet of Things Journal, 2021,8(7): 5914-5925.
|
[10] |
ZHANG Y Y , YUTAKA M , SASABE M ,et al. Attribute-based access control for smart cities:a smart-contract-driven framework[J]. IEEE Internet of Things Journal, 2021,8(8): 6372-6384.
|
[11] |
PHUONG T V X , YANG G M , SUSILO W . Hidden ciphertext policy attribute-based encryption under standard assumptions[J]. IEEE Transactions on Information Forensics and Security, 2016,11(1): 35-45.
|
[12] |
王悦, 樊凯 . 隐藏访问策略的高效CP-ABE方案[J]. 计算机研究与发展, 2019,56(10): 2151-2159.
|
|
WANG Y , FAN K . Effective CP-ABE with hidden access policy[J]. Journal of Computer Research and Development, 2019,56(10): 2151-2159.
|
[13] |
GAN T Y , LIAO Y J , LIANG Y K ,et al. Partial policy hiding attribute-based encryption in vehicular fog computing[J]. Soft Computing, 2021,25(16): 10543-10559.
|
[14] |
ZHANG W , ZHANG Z S , XIONG H ,et al. PHAS-HEKR-CP-ABE:partially policy-hidden CP-ABE with highly efficient key revocation in cloud data sharing system[J]. Journal of Ambient Intelligence and Humanized Computing, 2022,13(1): 613-627.
|
[15] |
HAO J L , HUANG C , NI J B ,et al. Fine-grained data access control with attribute-hiding policy for cloud-based IoT[J]. Computer Networks, 2019,153: 1-10.
|
[16] |
ARKIN G , HELIL N . Ciphertext-policy attribute based encryption with selectively-hidden access policy[J]. Computing and Informatics, 2021,40(5): 1136-1159.
|
[17] |
ZENG P , ZHANG Z T , LU R X ,et al. Efficient policy-hiding and large universe attribute-based encryption with public traceability for Internet of medical things[J]. IEEE Internet of Things Journal, 2021,8(13): 10963-10972.
|
[18] |
GAO J T , YU H Y , ZHU X Q ,et al. Blockchain-based digital rights management scheme via multiauthority ciphertext-policy attributebased encryption and proxy re-encryption[J]. IEEE Systems Journal, 2021,15(4): 5233-5244.
|
[19] |
张小红, 孙岚岚 . 属性代理重加密的区块链密文云存储共享研究[J]. 系统仿真学报, 2020,32(6): 1009-1020.
|
|
ZHANG X H , SUN L L . Attribute proxy re-encryption for ciphertext storage sharing scheme on blockchain[J]. Journal of System Simulation, 2020,32(6): 1009-1020.
|
[20] |
PAUL A , SELVI S S D , RANGAN C P . Efficient attribute-based proxy re-encryption with constant size ciphertexts[C]// Progress in Cryptology - INDOCRYPT 2020. Berlin:Springer, 2020: 644-665.
|