[1] |
PANAYIOTOU C , SAMARAS G . A mobile agent approach for ubiquitous and personalized eHealth information systems[J]. Personalisation for E, 2008:792.
|
[2] |
ZHANG K , YANG K , LIANG X ,et al. Security and privacy for mobile healthcare networks[J]. IEEE Wireless Communications, 2015,22(4): 104-112.
|
[3] |
SAHAI A , WATERS B . Fuzzy identity-based encryption[C]// Advances in Cryptology EUROCRYPT 2005,Lecture Notes in Computer Science. 2005: 457-473.
|
[4] |
GOYAL V , PANDEY O , SAHAI A ,et al. Attribute-based encryption for fine-grained access control of encrypted data[C]// The 13th ACM conference on Computer and communications security. 2006: 89-98.
|
[5] |
BETHENCOURT J , SAHAI A , WATERS B . Ciphertext-policy attribute-based encryption[C]// Symposium on Security and Privacy. 2007: 321-334.
|
[6] |
HAHN C , KWON H , HUR J . Efficient attribute-based secure data sharing with hidden policies and traceability in mobile health networks[J]. Mobile Information Systems, 2016:13.
|
[7] |
ALSHEHRI S , RADZISZOWSKI S , AND RAJ R . Secure access for healthcare data in the cloud using ciphertext-policy attribute-based encryption[C]// IEEE 28th International Conference on Data Engineering Workshops (ICDEW ’12), 2012: 143-146.
|
[8] |
CHASE M , . Multi-authority attribute based encryption[M]// Theory of Cryptography. Springer Berlin Heidelberg, 2007: 515-534.
|
[9] |
CHASE M , CHOW S S M . Improving privacy and security in multi-authority attribute-based encryption[C]// Conference on Computer and Communications Security. 2009: 121-130.
|
[10] |
LI M , YU S , ZHENG Y ,et al. Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption[J]. IEEE Transactions on Parallel & Distributed Systems, 2012,24(1): 131-143.
|
[11] |
LEWKO A , WATERS B . Decentralizing attribute-based encryption[C]// International Conference on the Theory and Applications of Cryptographic Techniques. 2010: 568-588.
|
[12] |
LIU Z , CAO Z , HUANG Q ,et al. Fully secure multi-authority ciphertext-policy attribute-based encryption without random oracles[C]// European Conference on Research in Computer Security. 2011: 278-297.
|
[13] |
LI Q , MA J , LI R ,et al. Secure,efficient and revocable multi-authority access control system in cloud storage[J]. Computers & Security, 2016,59(C): 45-59.
|
[14] |
LIU Z , CAO Z , WONG D S . White-box traceable ciphertext-policy attribute-based encryption supporting any monotone access structures[J]. IEEE Transactions on Information Forensics and Security, 2013,8(1): 76-88.
|
[15] |
LI J , HUANG Q , CHEN X ,et al. Multi-authority ciphertext-policy attribute-based encryption with accountability[C]// The 6th ACM Symposium on Information,Computer and Communications Security. 2011: 386-390.
|
[16] |
GUAN Z , LI J , ZHANG Y ,et al. An efficient traceable access control scheme with reliable key delegation in mobile cloud computing[J]. EURASIP Journal on Wireless Communications and Networking, 2016,2016(1):208.
|
[17] |
LEWKO A , OKAMOTO T , SAHAI A ,et al. Fully secure functional encryption:attribute-based encryption and (hierarchical) inner product encryption[C]// International Conference on Theory and Applications of Cryptographic Techniques. 2010: 62-91.
|
[18] |
BEIMEL A . Secure schemes for secret sharing and key distribution[J]. DSc Dissertation, 1996.
|
[19] |
CARO A D , IOVINO V . jPBC:Java pairing based cryptography[J]. Proceedings - International Symposium on Computers and Communications, 2011,22(3): 850-855.
|