[1] |
SAHAI A,WATERS B.Fuzzy Identity-based Encryption[C]//AMS. 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, May 22-26, 2005, Aarhus, Denmark. Heidelberg: Springer, 2005: 457-473.
|
[2] |
程思嘉,张昌宏,潘帅卿. 基于CP-ABE算法的云存储数据访问控制方案设计[J]. 信息网络安全,2016(2):1-6.
|
[3] |
冯登国,陈成. 属性密码学研究[J].密码学报,2014,1(1):1-12.
|
[4] |
李淑梅. 基于属性加密的细粒度动态云访问控制研究[D]. 内蒙古:内蒙古科技大学,2015.
|
[5] |
郑周,张大军,李运发. 云计算中面向数据存储的安全访问控制机制[J]. 信息网络安全,2015(9):221-226.
|
[6] |
程勇. 云存储中密文策略访问控制机制性能优化关键技术研究[D]. 长沙:国防科学技术大学,2013.
|
[7] |
何享. 对等云存储服务系统的安全控制机制研究[D]. 武汉:华中科技大学,2013.
|
[8] |
范运东,吴晓平,石雄. 基于信任值评估的云计算访问控制模型研究[J]. 信息网络安全,2016(7):71-77.
|
[9] |
王晶,黄传河,王金海. 一种面向云存储的动态授权访问控制机制[J].计算机研究与发展,2016,53(4):904-920.
|
[10] |
叶少珍,陈丽卿. 基于查询属性基加密的访问控制方案[J]. 北京工业大学学报,2016,42(8):1160-1166.
|
[11] |
CHASE M. Multi-authority Attribute Based Encryption[EB/OL]. , 2016-9-10.
|
[12] |
MULLER S, KATZENBEISSER S, ECKERT C.Distributed Attribute-based Encryption[C]//KIISC. 11th International Conference on Information Security and Cryptology, December 3-5, 2008, Seoul, Korea. Heidelberg: Springer, 2009: 20-36.
|
[13] |
MULLER S, KATZENBEISSER S, ECKERT C.On Multi-authority Ciphertext-policy Attribute-based Encryption[J]. Bulletin of the Korean Mathematical Society, 2009, 46(4): 803-819.
|
[14] |
LWEKO A, WATERS B.Decentralizing Attribute-based Encryption[C]//IST Austria. 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, May 8-12, 2011, Tallinn, Estonia. Heidelberg: Springer, 2011: 568-588.
|
[15] |
LIU Zhen, CAO Zhenfu, HUANG Qiong, et al. Fully Secure Multi-authority Ciphertext-policy Attributr-based Encryption without Random Oracles[EB/OL]. , 2016-9-11.
|
[16] |
KAPADIA A, TSANG P P, SMITH S W.Attribute-based Publishing with Hidden Credentials and Hidden Policies[C]//NSA. 14th Annual Network & Distributed System Security Symposium, February 28-March 2, 2007, San Diego, CA, USA. Berlin: ResearchGate, 2007: 179-192.
|
[17] |
陈燕利. 基于属性的加密机制及应用研究[D]. 南京:南京邮电大学,2014.
|
[18] |
NISHIDE T, YONEYAMA K, OHTA K.Attribute-based Encryption with Partially Hidden Encryptor-specified Access Structures[C]//IACR. 6th International Conference on Applied Cryptography and Network Security, June 3-6, 2008, New York, USA. Heidelberg: Springer, 2008: 111-129.
|
[19] |
LAI Junzuo, DENG R H, LI Yingjiu.Fully Secure Ciphertext-policy Hiding CP-ABE[C]//ACM. 7th International Conference on Information Security Practice and Experience, May 30-June 1, 2011, Guangzhou, China. New York: ACM, 2011: 24-39.
|
[20] |
王海斌,陈少真. 隐藏访问结构的基于属性加密方案[J]. 电子与信息学报,2012,34(2):457-461.
|
[21] |
宋衍,秦臻,刘凤梅,等. 基于访问数的策略隐藏属性加密方案[J].通信学报,2015,36(9):119-126.
|
[22] |
BONEH D, GOH E, NISSIN K.Evaluating 2-DNF Formulas on Ciphertexts[C]//ACM. 2nd International Conference on Theory of Cryptography, February 10-12, 2005, Cambridge, MA, UK. New York: ACM, 2005:325-341.
|
[23] |
李琦. 基于属性的加密机制研究[D]. 西安:西安电子科技大学,2014.
|
[24] |
LEWKO A, OKAMTO T, SAHAI A, et al.Fully Secure Functional Encryption: Attribute-based Encryption and (Hierarchical) Inner Product Encryption[C]//IACR. 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, May 30-June 3, 2010, French Riviera, French. Heidelberg: Springer, 2010: 62-91.
|
[25] |
SHAMIR A.How to Share a Secret[J]. Communications of the ACM, 1979, 22(11): 612-613.
|
[26] |
GOLDWASSER S, MICALI S.Probabilistic Encryption & How to Play Mental Poker Keeping Secret All Partial Information[C]//ACM. 14th Annual ACM Symposium on Theory of Computing, May 5-7, 1982, San Francisco, California, USA. New York: ACM, 1982: 365-377.
|
[27] |
ATTRAPADUNG N.Dual System Encryption via Doubly Selective Security: Framework, Fully-secure Functional Encryption for Regular Languages, and More[C]//IACR. 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, May 11-15, 2014, Copenhagen, Denmark. Heidelberg: Springer, 2014: 557-577.
|
[28] |
BLAZE M, BLEUMER G, STRAUSS M.Divertible Protocols and Atomic Proxy Cryptography[C]//IACR. International Conference on the Theory and Application of Cryptographic Techniques, May 31-June 4, 1998, Espoo, Finland. Heidelberg: Springer, 1998: 127-144.
|
[29] |
闫玺玺,孟慧. 支持直接撤销的密文策略属性基加密方案[J]. 通信学报,2016,37(5):44-50.
|
[30] |
郭威,周学广,瞿成勤,等. 基于CP-ABE的编队跨域通信方案研究[J]. 通信学报,2015,36(S1):250-258.
|
[31] |
秦志光,包文意,赵洋,等. 云存储中一种模糊关键字搜索加密方案[J]. 信息网络安全,2015(6):7-12.
|
[32] |
SHAMAIR A. Identity Based Cryptosystems and Signature Schemes[EB/OL]. , 2016-8-10.
|
[33] |
宋开波. 基于密文策略属性基加密的云存储范围控制机制研究[D]. 长沙:国防科学技术大学,2012.
|
[34] |
刘文超. 云技术中基于属性的访问控制研究[D]. 成都:电子科技大学,2015.
|
[35] |
连科,赵泽茂,王丽君,等 . 一种支持属性重用的DCP-ABE方案研究[J]. 信息网络安全,2015(6):41-46.
|