| 1 | 李兴华,钟成,陈颖,等. 车联网安全综述[J]. 信息安全学报, 2019, 4(3):17-33. | 
																													
																						|  | LI X H, ZHONG C, CHEN Y, et al. Survey of Internet of Vehicles security[J]. Journal of Cyber Security, 2019, 4(3): 17-33. | 
																													
																						| 2 | 邵雯娟,沈庆国. 软件定义的D2D和V2X通信研究综述[J]. 通信学报, 2019, 40(4):179-194.  10.11959/j.issn.1000-436x.2019075 | 
																													
																						|  | SHAO W J, SHEN Q G. Survey of software defined D2D and V2X communication[J]. Journal on Communications, 2019, 40(4): 179-194.  10.11959/j.issn.1000-436x.2019075 | 
																													
																						| 3 | 程嘉朗,倪巍,吴维刚,等. 车载自组织网络在智能交通中的应用研究综述[J]. 计算机科学, 2014, 41(6A):1-10. | 
																													
																						|  | CHENG J L, NI W, WU W G, et al. Survey on Vehicular Ad hoc Network based intelligent transportation system[J]. Computer Science, 2014, 41(6A): 1-10. | 
																													
																						| 4 | 李聪聪. 面向车联网信息安全问题的安全机制研究[D]. 北京:北京交通大学, 2019:42-48. | 
																													
																						|  | LI C C. Research on secure mechanism in internet of vehicles for information security issues[D]. Beijing: Beijing Jiaotong University, 2019: 42-48. | 
																													
																						| 5 | 张启坤,甘勇,王锐芳,等. 簇间非对称群组密钥协商协议[J]. 计算机研究与发展, 2018, 55(12): 2651-2663.  10.1016/j.jnca.2018.08.013 | 
																													
																						|  | ZHANG Q K, GAN Y, WANG R F, et al. Inter-cluster asymmetric group key agreement[J]. Journal of Computer Research and Development, 2018, 55(12): 2651-2663.  10.1016/j.jnca.2018.08.013 | 
																													
																						| 6 | BETHENCOURT J, SAHAI A, WATERS B. Ciphertext-policy attribute-based encryption[C]// Proceedings of the 2007 IEEE Symposium on Security and Privacy. Piscataway: IEEE, 2007: 321-334.  10.1109/sp.2007.11 | 
																													
																						| 7 | WATERS B. Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization[C]// Proceedings of the 2011 International Workshop on Public Key Cryptography, LNSC 6571. Berlin: Springer, 2011: 53-70. | 
																													
																						| 8 | 来思远. 基于属性加密的车载网络数据传输技术研究[D]. 上海:华东师范大学, 2018:19-32. | 
																													
																						|  | LAI S Y. Research on technology of attribute-based encryption for VANETs[D]. Shanghai: East China Normal University, 2018: 19-32. | 
																													
																						| 9 | 何倩,刘鹏,王勇. 可撤销动静态属性的车联网属性基加密方法[J]. 计算机研究与发展, 2017, 54(11):2456-2466.  10.7544/issn1000-1239.2017.20170373 | 
																													
																						|  | HE Q, LIU P, WANG Y. Attribute based encryption method with revocable dynamic and static attributes for VANETs[J]. Journal of Computer Research and Development, 2017, 54(11): 2456-2466.  10.7544/issn1000-1239.2017.20170373 | 
																													
																						| 10 | YEH L O, CHEN Y C, HUANG J L. ABACS: an attribute-based access control system for emergency services over vehicular ad hoc networks[J]. IEEE Journal on Selected Areas in Communications, 2011, 29(3):630-643.  10.1109/jsac.2011.110312 | 
																													
																						| 11 | LI H, PEI L S, LIAO D, et al. FADB: a fine-grained access control scheme for VANET data based on blockchain[J]. IEEE Access, 2020, 8: 85190-85203.  10.1109/access.2020.2992203 | 
																													
																						| 12 | ZHANG L Y, WANG J, MU Y. Secure and privacy-preserving attribute-based sharing framework in vehicles ad hoc networks[J]. IEEE Access, 2020, 8:116781-116795.  10.1109/access.2020.3004247 | 
																													
																						| 13 | BOUABDELLAH M, BOUANANI F EL, BEN-AZZA H. A secure cooperative transmission model in VANET using attribute based encryption[C]// Proceedings of the 2016 International Conference on Advanced Communication Systems and Information Security. Piscataway: IEEE, 2016:1-6.  10.1109/acosis.2016.7843940 | 
																													
																						| 14 | LEWKO A, WATERS B. Decentralizing attribute-based encryption[C]// Proceedings of the 2011 Annual International Conference on the Theory and Applications of Cryptographic Techniques, LNSC 6632. Berlin: Springer, 2011: 568-588. | 
																													
																						| 15 | ROUSELAKIS Y, WATERS B. Efficient statically-secure large-universe multi-authority attribute-based encryption[C]// Proceedings of the 2015 International Conference on Financial Cryptography and Data Security, LNSC 8975. Berlin: Springer, 2015: 315-332. | 
																													
																						| 16 | 仲红,崔杰,朱文龙,等. 高效且可验证的多授权机构属性基加密方案[J]. 软件学报, 2018, 29(7):2006-2017.  10.13328/j.cnki.jos.005365 | 
																													
																						|  | ZHONG H, CUI J, ZHU W L, et al. Efficient and verifiable muti-authority attribute based encryption scheme[J]. Journal of Software, 2018, 29(7): 2006-2017.  10.13328/j.cnki.jos.005365 | 
																													
																						| 17 | 明洋,何宝康. 支持属性撤销的可验证外包的多授权属性加密方案[J]. 计算机应用, 2019, 39(12):3556-3562.  10.11772/j.issn.1001-9081.2019061019 | 
																													
																						|  | MING Y, HE B K. Attribute revocation and verifiable outsourcing supported multi-authority attribute-based encryption scheme[J]. Journal of Computer Applications, 2019, 39(12): 3556-3562.  10.11772/j.issn.1001-9081.2019061019 | 
																													
																						| 18 | 王亚琼,史国振,谢绒娜,等. 卫星网络中支持策略隐藏的多授权访问控制方案[J]. 计算机应用, 2019, 39(2):470-475.  10.11772/j.issn.1001-9081.2018081959 | 
																													
																						|  | WANG Y Q, SHI G Z, XIE R N, et al. Multi-authority access control scheme with policy hiding of satellite network[J]. Journal of Computer Applications, 2019, 39(2): 470-475.  10.11772/j.issn.1001-9081.2018081959 | 
																													
																						| 19 | DE CARO A, LOVINO V. jPBC: Java pairing based cryptography[C]// Proceedings of the 2011 IEEE Symposium on Computers and Communications. Piscataway: IEEE, 2011: 850-855.  10.1109/iscc.2011.5983948 |