[1] |
朱鹏飞,张利琴,李伟,等.交互型电子签名的形式化分析[J]. 信息网络安全,2016(9):31-34.
|
[2] |
KIM M I, JOHNSON K B.Personal Health Records[J]. Journal of the American Medical Informatics Association, 2003, 9(2): 171-180.
|
[3] |
LOHR H, SADEGHI A R, WINDANDY M.Securing the e-health Cloud[C]// ACM.1st ACM International Health Informatics Symposium, November 11-12, 2010. Arlington, Virginia, USA. New York: ACM, 2010: 220-229.
|
[4] |
GOYAL V, PANDEY O, SAHAI A, et al.Attribute-based Encryption for Fine Grained Access Control of Encrypted Data[C]// ACM.13th ACM conference on Computer and Communications Security. October 30-November 3, 2006. Alexandria, Virginia, USA. New York: ACM, 2006: 89-98.
|
[5] |
MAJI H, PRABHAKARAN M, ROSULEK M.Attribute-based Signatures[C]//CT-RSA.The conference on Cryptology CT-RSA 2011. February 14-18, 2011, San Francisco, USA. Berlin: Springer, 2011: 376-392.
|
[6] |
LIU Jianghua, HUANG Xinyi, LIU Joseph, Secure Sharing of Personal Health Records in Cloud Computing: Cihpertext Policy Attribute Based Signcryption[J]. Future Generation Computer Systems, 2015, 52(11): 67-76.
|
[7] |
GAGNE M, NARAYAN S, SAFAVI-NAINI R.Threshold Attribute-based Signcryption[C]// Springer.Proceedings of the 7th International Conference on Security and Cryptography for Networks. September 13-15, 2010. Amalfi, Italy. Berlin: Springer, 2010: 154-171.
|
[8] |
PANDIT T, KUMAR P S, BARUA R.Attribute-based Signcryption: Signer Privacy, Strong Unforgeability and IND-CCA2 Security in Adaptive-predicates Attack[C]//Springer.Proceedings of the 8th International Conference on Provable Security. October 9-10, 2014. Hong Kong, China. Berlin: Springer, 2014: 274-290.
|
[9] |
RAO S Y, DUTTA R.Efficient Attribute-based Signature and Signcryption Realizing Expressive Access Structures[J]. International Journal of Information Security, 2016,15(1): 1-29.
|
[10] |
IBRAIMI L, ASIM M, PETKOVIC M.Secure Mangagement of Personal Health Records by Applying Attribute Based Encryption[C]// IEEE.Proceedings of the 6th International Conference on Wearable, Micro, and Nano Techologies for Personalized Health, June 24-26, 2009. Oslo, Norway. New Jersey:IEEE, 2009: 71-74.
|
[11] |
ZHENG Yao, YU Shucheng, LI Ming, et al.Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute based Encryption[J]. IEEE Transactions on parallel and distribute systems. 2013, 24(1): 131-143.
|
[12] |
WAGNER P J, DIAS J, HOWARS S, et al.Personal Health Rerecord and Hypertension Control: a Randomized Trial[J]. Journal of the American Medical Informatics Association, 2012, 19(4): 626-634.
|
[13] |
CHEN Cheng, CHEN Jie, LIM Hoonwei, et al.Combined Public-key Schemes:the Case of ABE and ABS[C]//Springer.Proceedings of the Conference on Provable Security 2012. September 26-28, 2012. Chengdu, China. Berlin: Springer, 2012: 53-69.
|
[14] |
GREEN M, HOHENBERGER S, WATERS B.Outsourcing the Decryption of ABE Ciphertexts[C]//ACM.Proceedings of the 20th USENIX Conference on Security. August 8-12, 2011. San Francisco, USA. New York: ACM, 2011: 34-49.
|
[15] |
王皓,郑志华,吴磊,等.自适应安全的外包CP-ABE方案研究[J].计算机研究与发展. 2015,52(10):2270-2280.
|
[16] |
张永强,卢伟龙,唐春明.一种高效实用的基于云服务的数字签名方案研究[J]. 信息网络安全,2016(7):1-6.
|
[17] |
QIN Baodong, DENG Robert H, LIU Shengli, et al.Attribute-based Encryption with Efficient Verifiable Outsourced Decryption[J]. IEEE Transaction on Information Forensics and Security, 2015, 10(7):1384-1393.
|
[18] |
WATER B.Ciphertext Policy Attribute Based Encryption: an Expressive, Efficient, and Provably Secure Realization[C]// ACM.Proceedings of the 14th International Conference on Practice and Theory of Public Key Cryptography, March 6-9, 2011. Taormina, Italy. New York: ACM, 2011: 53-70.
|
[19] |
张言胜,汪学明,仇各各.一种新的动态门限数字签名方案研究[J]. 信息网络安全,2016(6):62-67.
|