[1] XIONG J B, REN J, CHEN L, et al. Enhancing privacy and availability for data clustering in intelligent electrical service of IoT[J/OL].[2018-03-26]. IEEE Internet of Things Journal, 2018. https://ieeexplore.ieee.org/document/8370699. [2] LIU X, DENG R, CHOO K K R, et al. Privacy-preserving out-sourced calculation toolkit in the cloud[J/OL]. IEEE Transactions on Dependable & Secure Computing, 2018[2018-03-26]. https://ieeexplore.ieee.org/document/8318625. [3] ZHANG Y H, ZHENG D, DENG R H. Security and privacy in smart health:efficient policy-hiding attribute-based access control[J]. IEEE Internet of Things Journal, 2018, 5(3):2130-2145. [4] SAHAI A, WATERS B. Fuzzy identity-based encryption[C]//Proceedings of the 24th Annual International Conference on Theory and Applications of Cryptographic Techniques, LNCS 3494. Berlin:Springer, 2005:457-473. [5] BETHENCOURT J, SAHAI A, WATERS B. Ciphertext-policy attribute-based encryption[C]//Proceedings of the 2007 IEEE Symposium on Security and Privacy. Piscataway, NJ:IEEE, 2007:321-334. [6] ZHOU Z B, HUANG D J, WANG Z J. Efficient privacy-preserving ciphertext-policy attribute based encryption and broadcast encryption[J]. IEEE Transactions on Computers, 2014, 64(1):126-138. [7] 李琦,马建峰,熊金波,等.一种素数阶群上构造的自适应安全的多授权机构CP-ABE方案[J].电子学报,2014,42(4):696-702.(LI Q, MA J F, XIONG J B, et al. An adaptively secure multi-authority ciphertext-policy ABE scheme on prime order groups[J]. Acta Electronica Sinica, 2014, 42(4):696-702.) [8] WATERS B. Ciphertext-policy attribute-based encryption:An expressive, efficient, and provably secure realization[C]//Proceedings of the 2011 International Workshop on Public Key Cryptography, LNCS 6571. Berlin:Springer, 2011:53-70. [9] GREEN M, HOHENBERGER S, WATERS B. Outsourcing the decryption of ABE ciphertexts[C]//Proceedings of the 20th USENIX Conference on Security. Berkeley, CA:USENIX Association, 2011:34-34. [10] LAI J Z, DENG R H, GUAN C W, et al. Attribute-based encryption with verifiable outsourced decryption[J]. IEEE Transactions on Information Forensics and Security, 2013, 8(8):1343-1354. [11] NING J T, CAO Z F, DONG X L, et al. Auditable σ-time outsourced attribute-based encryption for access control in cloud computing[J]. IEEE Transactions on Information Forensics and Security, 2018, 13(1):94-105. [12] LI J G, WANG Y, ZHANG Y C, et al. Full verifiability for outsourced decryption in attribute based encryption[J/OL]. IEEE Transactions on Services Computing, 2017[2018-03-26]. https://ieeexplore.ieee.org/document/7936626. [13] LEWKO A, OKAMOTO T, SAHAI A, et al. Fully secure functional encryption:attribute-based encryption and (hierarchical) inner product encryption[C]//Proceedings of the 29th Annual International Conference on Theory and Applications of Cryptographic Techniques, LNCS 6110. Berlin:Springer, 2010:62-91. [14] LIU Z, CAO Z F, WONG D C S. White-box traceable ciphertext-policy attribute-based encryption supporting any monotone access structures[J]. IEEE Transactions on Information Forensics and Security. 2013, 8(1):76-88. |