[1] |
傅颖勋,罗圣美,舒继武.安全云存储系统与关键技术综述[J]. 计算机研究与发展,2013,50(1):136-145.
|
[2] |
付印金,肖侬,刘芳.重复数据删除关键技术研究进展[J].计算机研究与发展,2012,49(1):12-20.
|
[3] |
秦志光,包文意,赵洋,等. 云存储中一种模糊关键字搜索加密方案[J]. 信息网络安全,2015(6):7-12.
|
[4] |
DOUCEUR J R, ADYA A, BOLOSKY W J, et al.Reclaiming Space from Duplicate Files in a Serverless Distributed File System[C]//IEEE. Distributed Computing Systems, 2002. Proceedings. 22nd International Conference on, July 2-5,2002. Vienna, Austria.NJ:IEEE, 2002: 617-624.
|
[5] |
闫玺玺,叶青,刘宇. 云环境下支持隐私保护和用户撤销的属性基加密方案[J]. 信息网络安全,2017(6):14-21.
|
[6] |
YUAN Jiawei, YU Shucheng. Secure and Constant Cost Public Cloud Storage Auditing with Deduplication[EB/OL]. .
|
[7] |
BELLARE M, KEELVEEDHI S, RISTENPART T.Message-Locked Encryption and Secure Deduplication[A]// Advances in Cryptology-EUROCRYPT 2013[M]. Heidelberg :Springer, Berlin, Heidelberg,2013: 296-312.
|
[8] |
BELLARE M, KEELVEEDHI S, RISTENPART T.DupLESS: Server-Aided Encryption for Deduplicated Storage[C]//ACM. SEC'13 Proceedings of the 22nd USENIX conference on Security, August 14 - 16, 2013. Washington, D.C.New York:ACM. 2013: 179-194.
|
[9] |
PUZIO P, MOLVA R, ÖNEN M, et al.ClouDedup: Secure Deduplication with Encrypted Data for Cloud Storage[C]//IEEE. CLOUDCOM '13 Proceedings of the 2013 IEEE International Conference on Cloud Computing Technology and Science, December 2 - 5, 2013. Bristol, UK.NJ:IEEE, 2013:363-370.
|
[10] |
STANEK J, SORNIOTTI A, ANDROULAKI, et al. A Secure Data Deduplication Scheme for Cloud Storage[A]// Financial Cryptography and Data Security[M]. Heidelberg :Springer, Berlin, Heidelberg, 2014: 99-118.
|
[11] |
PUZIO P, MOLVA R, ÖNEN M, et al.PerfectDedup: Secure Data Deduplication[A]// Data Privacy Management, and Security Assurance[M]. Cham: Springer, Cham, 2015: 150-166.
|
[12] |
LIU Jian, ASOKAN N, PINKAS B.Secure Deduplication of Encrypted Data without Additional Independent Servers[C]//ACM. CCS '15 Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, October 12 - 16, 2015. Denver, Colorado, USA.New York:ACM,2015: 847-885.
|
[13] |
魏福山,马建峰,李光松,等. 标准模型下高效的三方口令认证密钥交换协议[J].软件学报, 2016, 27(9):2389-2399.
|
[14] |
胡学先,张振峰,刘文芬.标准模型下通用可组合的口令认证密钥交换协议[J].软件学报, 2011, 22(11):2820-2832.
|
[15] |
徐秋亮,李大兴. 椭圆曲线密码体制[J].计算机研究与发展, 1999, 36(11):1281-1288.
|
[16] |
张方国,王常杰,王育民.基于椭圆曲线的数字签名与盲签名[J]. 通信学报,2001,22(8):22-28.
|
[17] |
SAEKI M.Elliptic Curve Cryptosystems[J]. Mathematics of Computation, 1997, 2(4):1024-1028.
|
[18] |
SAKAI R,FURUKAWA J.Identity-Based Broadcast Encryption[J]. Journal of Electronics & Information Technology, 2007, 33(4):1047-1050.
|
[19] |
Delerablée C.Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys[A]// Advances in Cryptology - ASIACRYPT 2007[M]. Heidelberg :Springer, Berlin, Heidelberg ,2007:200-215.
|
[20] |
张键红,董巧翠. 混合机制下匿名广播加密方案的研究与实现[J]. 信息网络安全,2015(8):8-13.
|
[21] |
谭作文,刘卓军,肖红光. 一个安全公钥广播加密方案[J]软件学报, 2005, 16(7):1333-1343.
|
[22] |
庞辽军,李慧贤,焦李成,等.可证明安全的多接收者公钥加密方案设计与分析[J].软件学报, 2009, 20(10):2907-2914.
|
[23] |
STEINER M.The PBC_bce broadcast encryption library[EB/OL] .
|
|
https://crypto.stanford.edu/pbc/bce/,2017-5-10.
|
[24] |
LOUKIDES M, ORAM A.Programming with GNU SoftWare[M]. Sebastopol :O'Reilly & Associates, 1997, 86(3):350-359.
|
[25] |
HU Xiaoting, QIN Zhongping, ZHANG Hong, et al.Research and Improved Implementation of AES Algorithm in OpenSSL[J]. Microcomputer Information, 2009, 25(12):83-85.
|