[1] |
赵洋,包文意,熊虎,等. 云计算里一种陷门无法识别的公钥搜索加密方案[J]. 信息网络安全,2016(1):1-5.
|
[2] |
SAHAi A, WATERS B.Fuzzy Identity-Based Encryption[C] //Springer.The International Association for Cryptologic Research, Annual International Conference on the Theory and Applications of Cryptographic Techniques, May 22 - 26, 2005, Aarhus, Denmark . Heidelberg: Springer-Verlag Berlin, 2005: 457-473.
|
[3] |
GOYAL V, PANDEY O, SAHAI A, et al.Attribute-based Encryption for Fine-grained Access Control of Encrypted Data[C] //. ACM.13th ACM Conference on Computer and Communications Security, October, 2006, Alexandria, VA, USA. New York: ACM,2006 : 89-98.
|
[4] |
WANG Q, WANG C, Li J, et al.Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing[C] // Springer.Telecom Bretagne, European Symposium on Research in Computer Security, September 21-23 ,2009, Saint Malo, France. Heidelberg: Springer-Verlag Berlin, 2009: 355-370.
|
[5] |
EISSA T, CHO G H.A Fine Grained Access Control and Flexible Revocation Scheme for Data Security on Public Cloud Storage Services[C] // ICCCTAM.Birla Institute Of Technology & Science, Pilani, International Conference on Cloud Computing Technologies, Applications and Management (ICCCTAM), December 8-10,2012, Dubai, United Arab Emirates. Dubai: IEEE, 2012: 27-33.
|
[6] |
张柄虹, 张串绒, 焦和平,等. 一种属性可撤销的安全云存储模型[J]. 计算机科学, 2015, 42(7):210-215.
|
[7] |
CHASE M.Multi-authority Attribute Based Encryption[C] // Springer.International Association for Cryptologic Research, Theory of Cryptography Conference. February 21-24, 2007, Amsterdam, The Netherlands. Heidelberg: Springer-Verlag Berlin, 2007: 515-534.
|
[8] |
CHASE M, CHOW S S M. Improving Privacy and Security in Multi-authority Attribute-based Encryption[C] // ACM SIGSAC .16th ACM conference on Computer and communications security, November 9-13, 2009, Chicago,USA. New York: ACM, 2009: 121-130.
|
[9] |
YANG K, JIA X.Attributed-based Access Control for Multi-authority Systems in Cloud Storage[C] // IEEE.2012 IEEE 32nd International Conference on Distributed Computing Systems, June 18- 21, 2012, Macau, China. Newyork: IEEE, 2012:536-545.
|
[10] |
YANG M, LIU F, HAN J L, et al.An Efficient Attribute Based Encryption Scheme with Revocation for Outsourced Data Sharing Control[C] // IEEE, 2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control, October 21-23, 2011, Beijing, China. Newyork: IEEE, 2011: 516-520.
|
[11] |
程思嘉,张昌宏,潘帅卿. 基于CP-ABE算法的云存储数据访问控制方案设计[J]. 信息网络安全,2016(2):1-6.
|