[1] |
NAKAMOTO S. Bitcoin: A Peer-to-peer Electronic Cash System[EB/OL]. https://bitco.in/pdf/bitcoin.pdf, 2020-1-3.
|
[2] |
SAHAI A, WATERS B. Fuzzy Identity-based Encryption[M]// Springer. Advances in Cryptology - EUROCRYPT. Heidelberg: Springer Berlin Heidelberg, 2005: 457-473.
|
[3] |
CHASE M. Multi-authority Attribute-based Encryption[C]// Springer. The 4th Conference on Theory of Cryptography, February 21-24, 2007, Amsterdam, The Netherlands. Berlin: Springer-Verlag, 2007: 515-534.
|
[4] |
ZYSKIND G, NATHAN O, PENTLAND A S. Decentralizing Privacy: Using Blockchain to Protect Personal Data[C]// IEEE. 2015 IEEE Security and Privacy Workshops, May 21-22, 2015, San Jose, CA, USA. NJ: IEEE, 2015: 180-184.
|
[5] |
ES-SAMAALI H, OUTCHAKOUCHT A, LEROY J P. A Blockchain-based Access Control for Big Data[J]. Journal of Computer Networks and Communications, 2017,17(5):137-147.
|
[6] |
OUADDAH A, ELKALAM A A, OUAHMAN A A. Towards a Novel Privacy-Preserving Access Control Model Based on Blockchain Technology in IoT[M]// Springer. Europe and MENA Cooperation Advances in Information and Communication Technologies. Cham: Springer, Cham , 2017: 523-533.
|
[7] |
RAHULAMATHAVAN Y, PHAN R C W, MISRA S, et al. Privacy-preserving Blockchain-based IoT Ecosystem Using Attribute-based Encryption[C]// IEEE. IEEE International Conference on Advanced Networks and Telecommunications Systems(ANTS), December 17-20, 2017, Bhubaneswar, India. NJ: IEEE, 2017: 1-6.
|
[8] |
JUNG T, LI Xiangyang, WAN Zhiguo, et al. Privacy Preserving Cloud Data Access with Multi-authorities[C]// IEEE. IEEE INFOCOM, April 14-19, 2013, Turin, Italy. NJ: IEEE, 2013: 2625-2633.
|
[9] |
WEI Jianghong, LIU Wenfen, HU Xuexian. Forward-secure Ciphertext-policy Attribute-based Encryption Scheme[J]. Journal on Communications, 2014,35(7):38-45.
|
|
魏江宏, 刘文芬, 胡学先. 前向安全的密文策略基于属性加密方案[J]. 通信学报, 2014,35(7):38-45.
|
[10] |
WANG Guangbo, WANG Jianhua. Research on Cloud Storage Scheme with Attribute-based Encryption[J]. Journal of Electronics & Information Technology, 2016,38(11):2931-2939.
|
|
王光波, 王建华. 基于属性加密的云存储方案研究[J]. 电子与信息学报, 2016,38(11):2931-2939.
doi: 10.11999/JEIT160064
URL
|
[11] |
CHASE M, CHOW S S M. Improving Privacy and Security in Multi-authority Attribute-based Encryption[C]// ACM. The 16th ACM Conference on Computer and Communications Security, November 9-13, 2009, Chicago, Illinois, USA. New York: ACM, 2009: 121-130.
|
[12] |
LIN Huang, CAO Zhenfu, LIANG Xiaohui, et al. Secure Threshold Multi Authority Attribute- based Encryption without a Central Authority[J]. Information Sciences, 2010,180(13):2618-2632.
doi: 10.1016/j.ins.2010.03.004
URL
|
[13] |
LI Xiehua, ZHANG Mengmeng, LIU Hong, et al. Multi-authority ABE for Access Control in Cloud Storage[J]. Journal of Hunan University(Natural Sciences), 2015,42(10):133-140.
|
|
李谢华, 张蒙蒙, 刘鸿, 等. 基于MA-ABE的云存储访问控制方法[J]. 湖南大学学报(自然科学版), 2015,42(10):133-140.
|
[14] |
GUAN Zhitao, YANG Tingting, XU Ruzhi, et al. Multi-authority Attribute-based Encryption Access Control Model for Cloud Storage[J]. Journal on Communications, 2015,36(6):120-130.
|
|
关志涛, 杨亭亭, 徐茹枝, 等. 面向云存储的基于属性加密的多授权中心访问控制方案[J]. 通信学报, 2015,36(6):120-130.
|