[1] |
Yang Teng-fei, Shen Pei-song,Tian Xue,et al.Access control mechanism for classified and graded object storage in cloud computing[J].Journal of Software,2017,28(9):2334-2353.(in Chinese)
|
[2] |
Goyal V,Pandey O,Sahai A,et al.Attribute-based encryption for fine-grained access control of encrypted data[C]∥Proc of ACM Conference on Computer and Communications Security,2006:89-98.
|
[3] |
Waters B. Ciphertext-policy attribute-based encryption: An expressive efficient and provably secure realization[C]∥Proc of International Workshop on Public Key Cryptography,2011:53-70.
|
[4] |
Zhang Y,Zheng D,Deng R H.Security and privacy in smart health:Efficient policy-hiding attribute-based access control[J].IEEE Internet of Things Journal,2018,5(3):2130-2145.
|
[5] |
Xu Sheng-wei, Guo Chun-rui,Yuan Feng,et al.Encryption scheme of policy hidden file hierarchy attribute based on access tree[J].Computer Applications and Software,2021,38(2):323-327.(in Chinese)
|
[6] |
Yan Xi-xi, Liu Yuan, Li Zi-chen, et al. Multi-authority attribute-based encryption scheme with policy semi-hidden and dynamic updating[J].Journal of Xidian University,2018,45(2):122-128.(in Chinese)
|
[7] |
Wu A X,Zhang Y H,Zheng X K,et al.Efficient and privacy-preserving traceable attribute-based encryption in block chain[J].Annual of Telecommunications,2019,74(7-8):401-411.
|
[8] |
Yadav U C. Ciphertext-policy attribute-based encryption with hiding access structure[C]∥Proc of 2015 International Advance Computing Conference,2015:6-10.
|
[9] |
Ning J,Cao Z,Dong X,et al.White-box traceable CP-ABE for cloud storage service:How to catch people eaking their access credentials effectively[J].IEEE Transactions on Dependable and Secure Computing,2018,15(5):883-897.
|
[10] |
Ma Xiao-xiao,Huang Yan.Publicly traceable accountable ciphertext policy attribute based encryption scheme supporting large universe[J].Computer Science,2020,47(S1): 420-423.(in Chinese)
|
[11] |
Khan F,Li H,Zhang L,et al.An expressive hidden access policy CP-ABE[C]∥Proc of IEEE 2nd International Confe- rence on Data Science in Cyberspace,2017:178-186.
|
[12] |
Wang Mei,Sun Lei.A secure and traceable attribute-based encryption scheme with access structures[J].Computer Applications and Software,2017,34(2):267-271.(in Chinese)
|
[13] |
Li J,Chen X,Chow S S M,et al.Multi-authority fine grained access control with accountability and its application in cloud[J].Journal of Network and Computer Applications,2018,112:89-96.
|
[14] |
Changhee H, Hyunsoo K,Junbeom H.Efficient attribute-based secure data sharing with hidden policies and traceability in mobile health networks[J].Mobile Information Systems,2016:article ID 6545873.
|
[15] |
Shi Yu-qing,Ling Jie.Traceable attribute-based encryption with hiding access policies[J].Computer Engineering and Applications,2020,56(16):75-83.(in Chinese)
|
[16] |
Hu Yuan-yuan,Chen Yan-li,Zhu Min-hui.Privacy protection attribute-based ciphertext search scheme[J].Application Research of Computers,2019,36(4):1158-1164.(in Chinese)
|
|
附中文参考文献:
|
[1] |
杨腾飞,申培松,田雪,等.对象云存储中分类分级数据的访问控制方法[J].软件学报,2017,28(9):2334-2353.
|
[5] |
许盛伟,郭春锐,袁峰,等.基于访问树的策略隐藏文件层次属性加密方案[J].计算机应用与软件,2021,38(2):323-327.
|
[6] |
闫玺玺,刘媛,李子臣,等.策略半隐藏且支持更新的多机构属性加密方案[J].西安电子科技大学学报,2018,45(2):122-128.
|
[10] |
马潇潇,黄艳.大属性可公开追踪的密文策略属性基加密方案[J].计算机科学,2020,47(S1):420-423.
|
[12] |
王梅,孙磊.一个安全可追踪的策略隐藏属性基加密方案[J].计算机应用与软件,2017,34(2):267-271.
|
[15] |
石宇清,凌捷.隐藏访问策略的可追踪属性基加密方案[J].计算机工程与应用,2020,56(16):75-83.
|
[16] |
胡媛媛,陈燕俐,朱敏惠.可实现隐私保护的基于属性密文可搜索方案[J].计算机应用研究,2019,36(4):1158-1164.
|