[1] SAHAI A, WATERS B. Fuzzy identity-based encryption[C]//EUROCRYPT'05:Proceedings of the 24th Annual International Conference on Theory and Applications of Cryptographic Techniques. Berlin:Springer, 2005:457-473. [2] GOYAL V, PANDEY O, SAHAI A, et al. Attribute-based encryption for fine-grained access control of encrypted data[C]//CCS'06:Proceedings of the 13th ACM Conference on Computer and Communications Security. New York:ACM, 2006:89-98. [3] BETHENCOURT J, SAHAI A, WATERS B. Ciphertext-policy at-tribute-based encryption[C]//SP'07:Proceedings of the 2007 IEEE Symposium on Security and Privacy. Washington, DC:IEEE Computer Society, 2007:321-334. [4] 徐小龙,周静岚,杨庚.一种基于数据分割与分级的云存储数据隐私保护机制[J].计算机科学,2013,40(2):98-102.(XU X L, ZHOU J L, YANG G. Data privacy protection mechanism for cloud storage based on data partition and classification[J]. Computer Science, 2013, 40(2):98-102.) [5] SHAMIR A. Identity-based cryptosystems and signature schemes[C]//Proceedings of CRYPTO 84 on Advances in Cryptology. Berlin:Springer, 1985:47-53. [6] NISHIDE T, YONEYAMA K, OHTA K. Attribute-based encryption with partially hidden ciphertext policies[J]. IEICE Transactions on Fundamentals of Electronics Communications & Computer Sciences, 2009, 92-A(1):22-32. [7] CHASE M. Multi-authority attribute based encryption[C]//TCC 2007:Proceedings of the 4th Theory of Cryptography Conference on Theory of Cryptography. Berlin:Springer, 2007:515-534. [8] YU S, REN K, LOU W. Attribute-based content distribution with hidden policy[C]//NPSec 2008:Proceedings of the 20084th Workshop on Secure Network Protocols. Piscataway, NJ:IEEE, 2008:39-44. [9] MVLLER S, KATZENBEISSER S. Hiding the policy in crypto-graphic access control[C]//STM 2011:Proceedings of the 7th International Workshop on Security and Trust Management. Berlin:Springer, 2012:90-105. [10] BALU A, KUPPUSAMY K. An expressive and provably secure ciphertext-policy attribute-based encryption[J]. Information Sciences, 2014, 276(4):354-362. [11] ZHANG Y, CHEN X, LI J, et al. Anonymous attribute-based encryption supporting efficient decryption test[C]//ASIA CCS'13:Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer And Communications Security. New York:ACM, 2013:511-516. [12] HUANG X Z, LIU J Q, HAN Z, et al. Privacy beyond sensitive values[J]. Science China Information Sciences, 2015, 58(7):1-15. [13] 付雅丹,杨庚,胡持,等.基于MapReduce的并行AES加密算法[J].计算机应用,2015, 35(11):3079-3082.(FU Y D,YANG G, HU C, et al. Parallel algorithm for AES encryption on MapReduce[J]. Journal of Computer Applications, 2015, 35(11):3079-3082.) [14] ANGELO D C. Pairing-based cryptography library[EB/OL].[2015-12-14]. https://crypto.stanford.edu/pbc/. [15] NISHIDE T, YONEYAMA K, OHTA K. Attribute-based encryption with partially hidden encryptor-specified access structures[C]//ACNS 2008:Proceedings of the 6th International Conference on Applied Cryptography and Network Security. Berlin:Springer, 2008:111-129. |