1 |
JIANG Q, MA J, WEI F. On the security of a privacy-aware authentication scheme for distributed mobile cloud computing services[J]. IEEE Systems Journal, 2018, 12(2): 2039-2042. 10.1109/jsyst.2016.2574719
|
2 |
GATOUILLAT A, BADR Y, MASSOT B, et al. Internet of medical things: a review of recent contributions dealing with cyber-physical systems in medicine[J]. IEEE Internet of Things Journal, 2018, 5(5): 3810-3822. 10.1109/jiot.2018.2849014
|
3 |
SANTAGATI G E, DAVE N, MELODIA T. Design and performance evaluation of an implantable ultrasonic networking platform for the internet of medical things[J]. IEEE/ACM Transactions on Networking, 2020, 28(1): 29-42. 10.1109/tnet.2019.2949805
|
4 |
GOYAL V, PANDEY O, SAHAI A, et al. Attribute-based encryption for fine-grained access control of encrypted data[C] // Proceedings of the 13th ACM Conference on Computer and Communications Security. New York: ACM, 2006: 89-98. 10.1145/1180405.1180418
|
5 |
LI J, YU Q, ZHANG Y, et al. Key-policy attribute-based encryption against continual auxiliary input leakage[J]. Information Sciences, 2019, 470: 175-188. 10.1016/j.ins.2018.07.077
|
6 |
DAI W, DORÖZ Y, POLYAKOV Y, et al. Implementation and evaluation of a lattice-based key-policy ABE scheme[J]. IEEE Transactions on Information Forensics and Security, 2018, 13(5): 1169-1184. 10.1109/tifs.2017.2779427
|
7 |
BETHENCOURT J, SAHAI A, WATERS B. Ciphertext-policy attribute-based encryption[C] // Proceedings of the 2007 IEEE Symposium on Security and Privacy. Piscataway: IEEE, 2007: 321-334. 10.1109/sp.2007.11
|
8 |
PU Y, HU C, DENG S, et al. R²PEDS: a recoverable and revocable privacy-preserving edge data sharing scheme[J]. IEEE Internet of Things Journal, 2020, 7(9): 8077-8089. 10.1109/jiot.2020.2997389
|
9 |
ZHANG L, YOU W, MU Y. Secure outsourced attribute-based sharing framework for lightweight devices in smart health systems[J]. IEEE Transactions on Services Computing, 2022, 15(5): 3019-3030. 10.1109/tsc.2021.3073740
|
10 |
HAN D, PAN N, LI K-C. A traceable and revocable ciphertext-policy attribute-based encryption scheme based on privacy protection[J]. IEEE Transactions on Dependable and Secure Computing, 2022, 19(1): 316-327. 10.1109/tdsc.2020.2977646
|
11 |
XUE K, GAI N, HONG J, et al. Efficient and secure attribute-based access control with identical sub-policies frequently used in cloud storage[J]. IEEE Transactions on Dependable and Secure Computing, 2022, 19(1): 635-646. 10.1109/tdsc.2020.2987903
|
12 |
OBIRI I A, XIA Q, XIA H, et al. Personal health records sharing scheme based on attribute based signcryption with data integrity verifiable[J]. Journal of Computer Security, 2022, 30(2): 291-324. 10.3233/jcs-210045
|
13 |
SONG D X, WAGNER D, PERRIG A. Practical techniques for searches on encrypted data[C]// Proceedings of the 2000 IEEE Symposium on Security and Privacy. Piscataway: IEEE, 2000: 44-55.
|
14 |
BONEH D, DI CRESCENZO G, OSTROVSKY R, et al. Public key encryption with keyword search[C]// Proceedings of the 2004 International Conference on the Theory and Applications of Cryptographic Techniques. Berlin: Springer, 2004: 506-522. 10.1007/978-3-540-24676-3_30
|
15 |
LAI J, ZHOU X, DENG R H, et al. Expressive search on encrypted data[C]// Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security. New York: ACM, 2013: 243-252. 10.1145/2484313.2484345
|
16 |
LV Z, HONG C, ZHANG M, et al. Expressive and secure searchable encryption in the public key setting[C] // Proceedings of the 2014 International Conference on Information Security. Cham: Springer, 2014: 364-376. 10.1007/978-3-319-13257-0_21
|
17 |
殷新春, 王梦宇, 宁建廷. 轻量级可搜索医疗数据共享方案[J]. 通信学报, 2022, 43(5): 110-122. 10.11959/j.issn.1000-436x.2022090
|
|
YIN X C, WANG M Y, NING J T. Lightweight searchable medical data sharing scheme[J]. Journal on Communications, 2022, 43(5): 110-122. 10.11959/j.issn.1000-436x.2022090
|
18 |
PIRRETTI M, TRAYNOR P, McDANIEL P, et al. Secure attribute-based systems[C]// Proceedings of the 13th ACM Conference on Computer and Communications Security. New York: ACM, 2006: 99-112. 10.1145/1180405.1180419
|
19 |
YU S, WANG C, REN K, et al. Attribute based data sharing with attribute revocation[C]// Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security. New York: ACM, 2010: 261-270. 10.1145/1755688.1755720
|
20 |
OSTROVSKY R, SAHAI A, WATERS B. Attribute-based encryption with non-monotonic access structures[C]// Proceedings of the 14th ACM Conference on Computer and Communications Security. New York: ACM, 2007: 195-203. 10.1145/1315245.1315270
|
21 |
STADDON J, GOLLE P, GAGNÉ M, et al. A content-driven access control system[C]// Proceedings of the 7th Symposium on Identity and Trust on the Internet. New York: ACM, 2008: 26-35. 10.1145/1373290.1373296
|
22 |
MA H, ZHANG R, SUN S, et al. Server-aided fine-grained access control mechanism with robust revocation in cloud computing[J]. IEEE Transactions on Services Computing, 2019, 15(1): 164-173.
|
23 |
EDEMACU K, JANG B, KIM J W. Collaborative eHealth privacy and security: an access control with attribute revocation based on OBDD access structure[J]. IEEE Journal of Biomedical and Health Informatics, 2020, 24(10): 2960-2972. 10.1109/jbhi.2020.2973713
|
24 |
王光波, 刘海涛, 王晨露, 等. 云存储环境下可撤销属性加密[J]. 计算机研究与发展, 2018, 55(6): 1190-1200. 10.7544/issn1000-1239.2018.20170063
|
|
WANG G B, LIU H T, WANG C L, et al. Revocable attribute based encryption in cloud storage[J]. Journal of Computer Research and Development, 2018, 55 (6): 1190-1200. 10.7544/issn1000-1239.2018.20170063
|
25 |
KRAWCZYK H, RABIN T. Chameleon signatures[C]// Proceedings of the 2000 Network and Distributed System Security Symposium. San Diego: The Internet Society, 2000: 143-154.
|
26 |
LI J, ZHANG Y, CHEN X, et al. Secure attribute-based data sharing for resource-limited users in cloud computing[J]. Computers & Security, 2018, 72: 1-12. 10.1016/j.cose.2017.08.007
|
27 |
KHALILI M, DAKHILALIAN M, SUSILO W. Efficient chameleon hash functions in the enhanced collision resistant model[J]. Information Sciences, 2020, 510: 155-164. 10.1016/j.ins.2019.09.001
|
28 |
DE S J, RUJ S. Efficient decentralized attribute based access control for mobile clouds[J]. IEEE Transactions on Cloud Computing, 2017, 8(1): 124-137.
|
29 |
伍祈应, 马建峰, 李辉, 等. 支持用户撤销的多关键字密文查询方案[J]. 通信学报, 2017, 38(8): 183-193. 10.11959/j.issn.1000-436x.2017094
|
|
WU Q Y, MA J F, LI H, et al. Multi-keyword search over encrypted data with user revocation[J]. Journal on Communications, 2017, 38 (8): 183-193. 10.11959/j.issn.1000-436x.2017094
|
30 |
牛淑芬, 谢亚亚, 杨平平, 等. 区块链上基于云辅助的属性基可搜索加密方案[J]. 计算机研究与发展, 2021, 58(4): 811-821. 10.7544/issn1000-1239.2021.20200041
|
|
NIU S F, XIE Y Y, YANG P P, et al. Cloud-assisted attribute-based searchable encryption scheme on blockchain[J]. Journal of Computer Research and Development, 2021, 58(4): 811-821. 10.7544/issn1000-1239.2021.20200041
|