[1] |
Goyal V,Pandey O,Sahai A,et al.Attribute-based encryption for fine-grained access control of encrypted data[C]∥Proc of the 13th ACM Conference on Computer and Communications Security,2006:89-98.
|
[2] |
Sahai A,Waters B.Fuzzy identity-based encryption[C]∥Proc of the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques,2005:457-473。
|
[3] |
Yan Xi-Xi,He Xu,Liu Tao,et al.Traceable attribute-based encryption scheme with key-delegation abuse resistance[J].Journal on Communications,2020,41(4):150-161.(in Chinese)
|
[4] |
Joux A. A one round protocol for tripartite Diffie-Hellman[J].Journal of Cryptology,2004,17(4):263-276.
|
[5] |
Boneh D, Lynn B, Shacham H.Short signatures from the Weil pairing[J].Journal of Cryptology,2004,17(4):297-319.
|
[6] |
Boneh D, Franklin M.Identity-based encryption from the Weil pairing[C]∥Proc of Annual International Cryptology Conference,2001:213-229.
|
[7] |
Bethencourt J, Sahai A, Waters B. Ciphertext-policy attribute-based encryption[C]∥Proc of IEEE Symposium on Security and Privacy,2007:321-334.
|
[8] |
Ostrovsky R,Sahai A,Waters B.Attribute-based encryption with non-monotonic access structures[C]∥Proc of the 14th ACM Conference on Computer & Communications Security,2007:195-203.
|
[9] |
Waters B.Ciphertext-policy attribute-based encryption:An expressive,efficient,and provably secure realization[C]∥Proc of International Workshop on Public Key Cryptography,2011:53-70.
|
[10] |
Beimel A. Secure schemes for secret sharing and key distribution[D]. Haifa: Israel Institute of Technology, 1996.
|
[11] |
Ding S, Li C,Li H.A novel efficient pairing-free CP-ABE based on elliptic curve cryptography for IOT[J].IEEE Access,2018,6:27336-27345.
|
[12] |
Beuchat J L,Tadanori T,Jorge E,et al.High-speed software implementation of the optimal ate pairing over Barreto- Naehrig curves[C]∥Proc of International Conference on Pairing-Based Cryptography,2010:21-39.
|
[13] |
Barreto P S L M,Galbrath S D,Scott M,et al.Efficient pair- ing computation on supersingular Abelian varieties[J].Designs,Codes and Cryptography,2007,42(3):239-271.
|
[14] |
Guillevic A,Vergnaud D.Algorithms for outsourcing pairing computation[C]∥Proc of International Conference on Smart Card Research and Advanced Applications,2014:193-211.
|
[15] |
Canard S,Desmoulins N,Devigne J,et al.On the implementation of a pairing-based cryptographic protocol in a constrained device [C]∥Proc of International Conference on Pairing-Based Cryptography,2012:210-217.
|
[16] |
Freeman D, Scott M, Teske E. A taxonomy of pairing-friendly elliptic curves[J].Journal of Cryptology,2010,23(2):224-280.
|
[17] |
Odelu V,Das A K,Khan M K,et al.Expressive CP-ABE scheme for mobile devices in IoT satisfying constant-size keys and ciphertexts[J].IEEE Access,2017,5:3273-3283.
|
[18] |
Ding Sheng, Cao Jin, Li Hui. Efficient pairing-free CP-ABE based on ordered binary decision diagram[J].Journal on Communications,2019,40(12):1-8.(in Chinese)
|
[19] |
Cheung L, Newport C.Provably secure ciphertext policy ABE[C]∥Proc of the 14th ACM Conference on Computer and Communications Security,2007:456-465.
|
[20] |
Ma Hua, Bai Cui-cui, Li Bin,et al.Attribute-based encryption scheme supporting attribute revocation and decryption outsourcing[J].Journal of Xidian University (Natural Science),2015,42(6):6-10.(in Chinese)
|
[21] |
Li L,Gu T,Chang L,et al.A ciphertext-policy attribute-based encryption based on an ordered binary decision diagram[J].IEEE Access,2017,5:1137-1145.
|
[22] |
Li Xue-jun,Zhang Dan,Li Hui.Efficient revocable attribute-based encryption scheme[J].Journal on Communications,2019,40(6):32-39.(in Chinese)
|
[23] |
Yu Jin-xia,Yang Chao-chao,Yang Li-wei,et al.Attribute-based encryption scheme supporting tree access structure on ideal lattices[J].Journal of Chongqing University of Posts and Telecommunications (Natural Science Edition),2019,31(1):113-119.(in Chinese)
|
[24] |
Jiang Y,Susilo W,Wu Y,et al.Ciphertext-policy attribute-based encryption against key-delegation abuse in fog com- puting[J].Future Generation Computer Systems,2018,78(2):720-729.
|
[25] |
Rao Y S,Dutta R.Dynamic ciphertext-policy attribute-based encryption for expressive access policy[C]∥Proc of International Conference on Distributed Computing and Internet Technology,2014:275-286.
|
|
附中文参考文献:
|
[3] |
闫玺玺,何旭,刘涛,等.抗密钥委托滥用的可追踪属性基加密方案[J].通信学报,2020,41(4):150-161.
|
[18] |
丁晟,曹进,李晖.基于OBDD访问结构的无配对CP-ABE方案[J].通信学报,2019,40(12):1-8.
|
[20] |
马华,白翠翠,李宾,等.支持属性撤销和解密外包的属性基加密方案[J].西安电子科技大学学报 (自然科学版),2015,42(6):6-10.
|
[22] |
李学俊,张丹,李晖.可高效撤销的属性基加密方案[J].通信学报,2019,40(6):32-39.
|
[23] |
于金霞,杨超超,杨丽伟,等.理想格上支持访问树的属性基加密方案[J].重庆邮电大学学报(自然科学版),2019,31 (1):113-119.
|