[1] |
Dillon T,Wu C,Chang E.Cloud computing:Issues and challenges[C]∥Proc of 2010 24th IEEE International Conference on Advanced Information Networking and Applications,2010:27-33.
|
[2] |
Fang Wei. A paradigm shift from cloud computing to fog computing and edge computing[J].Journal of Nanjing University of Information Science and Technology(Natural Science Edition),2016,8(5):404-414.(in Chinese)
|
[3] |
Rivera D,Garcia A,Martin-Ruiz M,et al.Secure communications and protected data for an Internet of Things smart toy platform[J].IEEE Internet of Things Journal,2019,6(2):3785-3795.
|
[4] |
Alrawais A,Alhothaily A,Hu C,et al.Fog computing for the Internet of Things:Security and privacy issues[J].IEEE Internet Computing,2017,21(2):34-42.
|
[5] |
Bethencourt J,Sahai A,Waters B.Ciphertext-policy attribute- based encryption[C]∥Proc of 2007 IEEE Symposium on Security and Privacy(SP’07),2007:321-334.
|
[6] |
Waters B.Ciphertext-policy attribute-based encryption:An expressive,efficient,and provably secure realization[C]∥Proc of International Workshop on Public Key Cryptography,2008:321-334.
|
[7] |
Yan Xi-xi,He Guang-hui,Yu Jin-xia. Secure and verifiable outsourced ciphertext policy attribute-based encryption[J].Journal of Cryptologic Research,2020,7(5):628-642.(in Chinese)
|
[8] |
Ding S, Li C, Li H.A novel efficient pairing-free CP-ABE based on elliptic curve cryptography for IoT[J].IEEE Access,2018,6:27336-27345.
|
[9] |
Fan K,Xu H,Gao L,et al.Efficient and privacy preserving access control scheme for fog-enabled IoT[J].Future Gene- ration Computer Systems,2019,99:134-142.
|
[10] |
Long Hao,Zhang Shu-kui,Zhang Li.Fog-assisted cloud data sharing scheme based on attribute-based encryption[J].Computer Engineering and Design,2021,42(1):31-37.(in Chinese)
|
[11] |
Emura K,Miyaji A,Omote K,et al.A ciphertext-policy attribute-based encryption scheme with constant ciphertext length[J]. International Journal of Applied Cryptography,2010,2(1):46-59.
|
[12] |
Guo F, Mu Y,Susilo W,et al.CP-ABE with constant-size keys for lightweight devices[J].IEEE Transactions on Information Forensics and Security,2014,9(5):763-771.
|
[13] |
Odelu V,Das A,Rao Y,et al.Pairing-based CP-ABE with constant-size ciphertexts and secret keys for cloud environment[J].Computer Standards and Interfaces,2017,54(1):3-9.
|
[14] |
Herranz J, Laguilaumie F,Rafols C.Constant size ciphertexts in threshold attribute-based encryption[C]∥Proc of the 13th International Conference on Practice and Theory in Public Key Cryptography,2010:19-34.
|
[15] |
Chen C,Zhang Z F, Feng D G.Efficient ciphertext policy attribute-based encryption with constant-size ciphertext and constant computation-cost[C]∥Proc of the 15th International Conference on Provable Security,2011:84-101.
|
[16] |
Tang Zhong-yuan,He Li-wen,Chen Chao,et al.An access control scheme based on constant-size keys and ciphertexts[J].Computer Technology and Development,2018,28(11):128-134.(in Chinese)
|
[17] |
Green M,Hohenberger S,Waters B.Outsourcing the decryption of ABE ciphertexts[C]∥Proc of the 20th USENIX Conference on Security,2011:1-16.
|
[18] |
Li J,Sha F,Zhang Y,et al.Verifiable outsourced decryption of attribute-based encryption with constant ciphertext length[J].Security and Communication Networks,2017,2017:Article ID 3596205.
|
[19] |
Wang Shu-lan,Yu Jian-ping,Zhang Peng,et al.A compact and outsourced access control scheme in cloud computing[J].Journal of Signal Processing,2015,31(10):1224-1232.(in Chinese)
|
[20] |
Ma H,Zhang R,Wan Z,et al.Verifiable and exculpable outsourced attribute-based encryption for access control in cloud computing[J].IEEE Transactions on Dependable and Secure Computing,2015,14(6):679-692.
|
[21] |
Zuo C, Shao J, Wei G Y, et al.CCA-secure ABE with outsourced decryption for fog computing[J].Future Generation Computer Systems,2018,78(Pt.2):730-738.
|
[22] |
Zhang P,Chen Z H,Liu J K,et al.An efficient access control scheme with outsourcing capability and attribute update for fog computing[J].Future Generation Computer Systems,2018,78(Pt.2):753-762.
|
|
附中文参考文献:
|
[2] |
方巍.从云计算到雾计算的范式转变[J].南京信息工程大学学报(自然科学版),2016,8(5):404-414.
|
[7] |
闫玺玺,何广辉,于金霞.可验证的密文策略属性基加密安全外包方案[J].密码学报,2020,7(5):628-642.
|
[10] |
龙浩,张书奎,张力.基于属性加密的雾协同云数据共享方案[J].计算机工程与设计,2021,42(1):31-37.
|
[16] |
唐忠原,何利文,陈超,等.固定密钥与密文长度的访问控制方案[J].计算机技术与发展,2018,28(11):128-134.
|
[19] |
王树兰,喻建平,张鹏,等.云计算中一种紧凑型的外包访问控制方案[J].信号处理,2015,31(10):1224-1232.
|