1 |
姚文斌,韩司,李小勇.云存储环境下的密文安全共享机制[J].通信学报,2015,36(10):1-8. 10.11959/j.issn.1000-436x.2015211
|
|
YAO W B, HAN S, LI X Y. Security sharing scheme for encrypted data in cloud storage [J]. Journal on Communication, 2015, 36(10): 1-8. 10.11959/j.issn.1000-436x.2015211
|
2 |
SHAMIR A. Identity-based cryptosystems and signature schemes [C]// Proceedings of the 1984 Workshop on the Theory and Application of Cryptographic Techniques, LNCS196. Berlin: Springer, 1985: 47-53. 10.1007/3-540-39568-7_5
|
3 |
BLAZE M, BLEUMER G, STRAUSS M. Divertible protocols and atomic proxy cryptography [C]// Proceedings of the 1998 International Conference on the Theory and Applications of Cryptographic Techniques, LNCS1403. Berlin: Springer, 1998: 127-144.
|
4 |
ATENIESE G, FU K, GREEN M, et al. Improved proxy re-encryption schemes with applications to secure distributed storage [J]. ACM Transactions on Information and System Security, 2006, 9(1): 1-30. 10.1145/1127345.1127346
|
5 |
GREEN M, ATENIESE G. Identity-based proxy re-encryption [C]// Proceedings of the 2007 International Conference on Applied Cryptography and Network Security, LNCS4521. Berlin: Springer, 2007: 288-306.
|
6 |
SHAO J, WEI G Y, LING Y, et al. Identity-based conditional proxy re-encryption [C]// Proceedings of the 2011 IEEE International Conference on Communications. Piscataway: IEEE, 2011: 1-5. 10.1109/icc.2011.5962419
|
7 |
汪倩倩,欧毓毅.可追踪且可撤销的基于OBDD访问结构的CP-ABE方案[J].计算机应用研究,2021,38(4):1185-1189.
|
|
WANG Q Q, OU Y Y. Traceable and revocable CP-ABE scheme OBDD-based access structure [J]. Application Research of Computers, 2021, 38(4): 1185-1189.
|
8 |
刘鹏,何倩,刘汪洋,等.支持撤销属性和外包解密的CP-ABE方案[J].信息网络安全,2020,20(3):90-97. 10.3969/j.issn.1671-1122.2020.03.012
|
|
LIU P, HE Q, LIU W Y, et al. CP-ABE scheme supporting attribute revocation and outsourcing decryption [J]. Netinfo Security, 2020, 20(3): 90-97. 10.3969/j.issn.1671-1122.2020.03.012
|
9 |
WENG J, DENG R H, DING X H, et al. Conditional proxy re-encryption secure against chosen-ciphertext attack [C]// Proceedings of the 2009 4th International Symposium on Information, Computer, and Communications Security. New York: ACM, 2009: 322-332. 10.1145/1533057.1533100
|
10 |
LIANG K T, LIU Z, TAN X, et al. A CCA-secure identity-based conditional proxy re-encryption without random oracles [C]// Proceedings of the 2012 International Conference on Information Security and Cryptology, LNCS7839. Berlin: Springer, 2012: 231-246.
|
11 |
FANG L M, SUSILO W, GE C P, et al. Interactive conditional proxy re-encryption with fine grain policy [J]. Journal of Systems and Software, 2011, 84(12): 2293-2302. 10.1016/j.jss.2011.06.045
|
12 |
GE C P, SUSILO W, WANG J D, et al. Identity-based conditional proxy re-encryption with fine grain policy [J]. Computer Standards and Interfaces, 2017, 52: 1-9. 10.1016/j.csi.2016.12.005
|
13 |
HUANG Q L, YANG Y X, FU J Y. PRECISE: identity-based private data sharing with conditional proxy re-encryption in online social networks [J]. Future Generation Computer Systems, 2017, 86:1523-1533. 10.1016/j.future.2017.05.026
|
14 |
LIU Y P, REN Y J, GE C P, et al. A CCA-secure multi-conditional proxy broadcast re-encryption scheme for cloud storage system [J]. Journal of Information Security and Applications, 2019, 47:125-131. 10.1016/j.jisa.2019.05.002
|
15 |
YAO S M, DAYOT R V J, KIM H J, et al. A novel revocable and identity-based conditional proxy re-encryption scheme with ciphertext evolution for secure cloud data sharing [J]. IEEE Access, 2021, 9: 42801-42816. 10.1109/access.2021.3064863
|
16 |
李莉,史国振,王璇,等.共享文件加密存储分级访问控制方案的实现[J].网络与信息安全学报,2016,2(7):26-32. 10.11959/j.issn.2096-109x.2016.00077
|
|
LI L, SHI G Z, WANG X, et al. Implementation of shared file encrypted storage hierarchical access control scheme [J]. Chinese Journal of Network and Information Security, 2016, 2(7): 26-32. 10.11959/j.issn.2096-109x.2016.00077
|
17 |
WU Y Z, CHEN S H, WANG G J, et al. User-controlled encrypted data sharing model in cloud storage [C]// Proceedings of the 2017 International Conference on Advanced Hybrid Information Processing, LNICST219. Cham: Springer, 2018: 12-20.
|
18 |
SHI J L, HUANG C H, HE K, et al. ACS-HCA: an access control scheme under hierarchical cryptography architecture [J]. Chinese Journal of Electronics, 2019, 28(1): 52-61. 10.1049/cje.2018.10.002
|
19 |
苏铓,史国振,谢绒娜,等.面向移动云计算的多要素代理重加密方案[J].通信学报,2015,36(11):73-79. 10.11959/j.issn.1000-436x.2015217
|
|
SU M, SHI G Z, XIE R N, et al. Multi-element based on proxy re-encryption scheme for mobile clued computing [J]. Journal on Communication, 2015, 36(11): 73-79. 10.11959/j.issn.1000-436x.2015217
|