1 |
ZHANG Y H, DENG R H, XU S M, et al. Attribute-based encryption for cloud computing access control: a survey[J]. ACM Computing Surveys, 2021, 53(4): 1-41.
|
2 |
SAHAI A, WATERS B. Fuzzy identity-based encryption[C]//Advances in Cryptology. Berlin: Springer, 2005: 457-473.
|
3 |
BETHENCOURT J, SAHAI A, WATERS B. Ciphertext-policy attribute-based encryption[C]//Proceedings of the 2007 IEEE Symposium on Security and Privacy. Piscataway: IEEE Press, 2007: 321-334.
|
4 |
YU S C, WANG C, REN K, et al. Achieving secure, scalable, and fine-grained data access control in cloud computing[C]//Proceedings of IEEE INFOCOM. Piscataway: IEEE Press, 2010: 1-9.
|
5 |
张嘉伟, 马建峰, 马卓, 等. 云计算中基于时间和隐私保护的可撤销可追踪的数据共享方案[J]. 通信学报, 2021, 42(10): 81-94.
|
|
ZHANG J W, MA J F, MA Z, et al. Time-based and privacy protection revocable and traceable data sharing scheme in cloud computing[J]. Journal on Communications, 2021, 42(10): 81-94.
|
6 |
郭丽峰, 邢晓敏, 郭慧. 云存储中高效可追踪可撤销的属性基加密方案[J]. 密码学报, 2023, 10(1): 131-145.
|
|
GUO L F, XING X M, GUO H. An efficient traceable and revocable attribute-based encryption scheme in cloud storage[J]. Journal of Cryptologic Research, 2023, 10(1): 131-145.
|
7 |
宁建廷, 黄欣沂, 魏立斐, 等. 支持恶意用户追踪的属性基云数据共享方案[J]. 计算机学报, 2022, 45(7): 1431-1445.
|
|
NING J T, HUANG X Y, WEI L F, et al. Tracing malicious insider in attribute-based cloud data sharing[J]. Chinese Journal of Computers, 2022, 45(7): 1431-1445.
|
8 |
罗王平, 冯朝胜, 邹莉萍, 等. 一种支持快速加密的基于属性加密方案[J]. 软件学报, 2020, 31(12): 3923-3936.
|
|
LUO W P, FENG C S, ZOU L P, et al. Attribute-based encryption scheme with fast encryption[J]. Journal of Software, 2020, 31(12): 3923-3936.
|
9 |
冯涛, 陈李秋, 方君丽, 等. 基于本地化差分隐私和属性基可搜索加密的区块链数据共享方案[J]. 通信学报, 2023, 44(5): 224-233.
|
|
FENG T, CHEN L Q, FANG J L, et al. Blockchain data sharing scheme based on localized difference privacy and attribute-based searchable encryption[J]. Journal on Communications, 2023, 44(5): 224-233.
|
10 |
MIAO Y B, TONG Q Y, CHOO K K R, et al. Secure online/offline data sharing framework for cloud-assisted industrial Internet of things[J]. IEEE Internet of Things Journal, 2019, 6(5): 8681-8691.
|
11 |
NING J T, CAO Z F, DONG X L, et al. Auditable $\sigma $-time outsourced attribute-based encryption for access control in cloud computing[J]. IEEE Transactions on Information Forensics and Security, 2018, 13(1): 94-105.
|
12 |
DAMG?RD I, HAAGH H, ORLANDI C. Access control encryption: enforcing information flow with cryptography[C]//Theory of Cryptography Conference. Berlin: Springer, 2016: 547-576.
|
13 |
KIM S, WU D J. Access control encryption for general policies from standard assumptions[J]. IACR Cryptology EPrint Archive, 2017, 2017: 467.
|
14 |
CUI J, LI B, ZHONG H, et al. A practical and efficient bidirectional access control scheme for cloud-edge data sharing[J]. IEEE Transactions on Parallel and Distributed Systems, 2022, 33(2): 476-488.
|
15 |
ATENIESE G, FRANCATI D, NU?EZ D, et al. Match me if you can: matchmaking encryption and its applications[J]. Journal of Cryptology, 2021, 34(3): 16.
|
16 |
XU S M, NING J T, LI Y J, et al. Match in my way: fine-grained bilateral access control for secure cloud-fog computing[J]. IEEE Transactions on Dependable and Secure Computing, 2022, 19(2): 1064-1077.
|
17 |
GOYAL V, PANDEY O, SAHAI A, et al. Attribute-based encryption for fine-grained access control of encrypted data[C]//Proceedings of the 13th ACM Conference on Computer and Communications Security. New York: ACM Press, 2006: 89-98.
|
18 |
XU S M, NING J T, HUANG X Y, et al. Server-aided bilateral access control for secure data sharing with dynamic user groups[J]. IEEE Transactions on Information Forensics and Security, 2021, 16: 4746-4761.
|
19 |
SUN J F, YUAN Y, TANG M J, et al. Privacy-preserving bilateral fine-grained access control for cloud-enabled industrial IoT healthcare[J]. IEEE Transactions on Industrial Informatics, 2022, 18(9): 6483-6493.
|
20 |
LEWKO A, OKAMOTO T, SAHAI A, et al. Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption[C]//Advances in Cryptology. Berlin: Springer, 2010: 62-91.
|
21 |
CARO A D, IOVINO V. jPBC: Java pairing based cryptography[C]//Proceedings of the 2011 IEEE Symposium on Computers and Communications (ISCC). Piscataway: IEEE Press, 2011: 850-855.
|