[1] |
徐嘉,张骥先,王喆民,等.基于NUMA云计算架构的多资源分配可信拍卖机制[J].计算机工程与科学,2024, 46(5): 761-775.
|
|
XU J, ZHANG J X, WANG Z M, et al. Truthful auction mechanisms for multi-resource allocation based on NUMA architecture for cloud computing [J]. Computer Engineering and Science, 2024, 46(5): 761-775.
|
[2] |
李琦,樊昊源,陈伟,等.面向云存储的属性基双边访问控制方案[J].通信学报,2024, 45(4): 128-136.
|
|
LI Q, FAN H Y, CHEN W, et al. Attribute-based bilateral access control scheme for cloud storage [J]. Journal on Communications, 2024, 45(4): 128-136.
|
[3] |
DENG L, FENG S, CHEN Z. Certificateless encryption scheme with provable security in the standard model suitable for mobile devices [J]. Information Sciences, 2022, 613: 228-238.
|
[4] |
BLAZE M, BLEUMER G, STRAUSS M. Divertible protocols and atomic proxy cryptography [C]// Proceedings of the 1998 International Conference on the Theory and Applications of Cryptographic Techniques, LNCS 1403. Berlin: Springer, 1998: 127-144.
|
[5] |
ZHANG J, SU S, ZHONG H, et al. Identity-based broadcast proxy re-encryption for flexible data sharing in VANETs [J]. IEEE Transactions on Information Forensics and Security, 2023, 18: 4830-4842.
|
[6] |
HAN X, TIAN D, ZHOU J, et al. Privacy-preserving proxy re-encryption with decentralized trust management for MEC-empowered VANETs [J]. IEEE Transactions on Intelligent Vehicles, 2023, 8(8): 4105-4119.
|
[7] |
GE C, LIU Z, XIA J, et al. Revocable identity-based broadcast proxy re-encryption for data sharing in clouds [J]. IEEE Transactions on Dependable and Secure Computing, 2021, 18(3): 1214-1226.
|
[8] |
MAITI S, MISRA S, MONDAL A. MBP: multi-channel broadcast proxy re-encryption for cloud-based IoT devices [J]. Computer Communications, 2024, 214: 57-66.
|
[9] |
WENG J, DENG R H, DING X, et al. Conditional proxy re-encryption secure against chosen-ciphertext attack [C]// Proceedings of the 4th International Symposium on Information, Computer, and Communications Security. New York: ACM, 2009: 322-332.
|
[10] |
LIU Y, REN Y, GE C, et al. A CCA-secure multi-conditional proxy broadcast re-encryption scheme for cloud storage system [J]. Journal of Information Security and Applications, 2019, 47: 125-131.
|
[11] |
JIANG L, GUO D. Dynamic encrypted data sharing scheme based on conditional proxy broadcast re-encryption for cloud storage [J]. IEEE Access, 2017, 5: 13336-13345.
|
[12] |
HUANG Q, YANG Y, FU J. PRECISE: identity-based private data sharing with conditional proxy re-encryption in online social networks [J]. Future Generation Computer Systems, 2018, 86: 1523-1533.
|
[13] |
LI P, ZHU L, GUPTA B B, et al. A multi-conditional proxy broadcast Re-encryption scheme for sensor networks [J]. Computers, Materials and Continua, 2020, 65(3): 2079-2090.
|
[14] |
LIANG X, WENG J, YANG A, et al. Attribute-based conditional proxy re-encryption in the standard model under LWE [C]// Proceedings of the 2021 European Symposium on Research in Computer Security, LNCS 12973. Cham: Springer, 2021: 147-168.
|
[15] |
YAO S, DAYOT R V J, KIM H J, et al. A novel revocable and identity-based conditional proxy re-encryption scheme with ciphertext evolution for secure cloud data sharing [J]. IEEE Access, 2021, 9: 42801-42816.
|
[16] |
YAO S, DAYOT R V J, RA I H, et al. An identity-based proxy re-encryption scheme with single-hop conditional delegation and multi-hop ciphertext evolution for secure cloud data sharing [J]. IEEE Transactions on Information Forensics and Security, 2023, 18: 3833-3848.
|
[17] |
CHEN Z, CHEN J, MENG W. A new dynamic conditional proxy broadcast re-encryption scheme for cloud storage and sharing [C]// Proceedings of the IEEE 18th International Conference on Dependable, Autonomic and Secure Computing. Piscataway: IEEE, 2020: 569-576.
|
[18] |
HU H, ZHOU Y, CAO Z, et al. Efficient and HRA secure universal conditional proxy re-encryption for cloud-based data sharing [J]. Applied Sciences, 2022, 12(19): No.9586.
|
[19] |
ZHANG L, YANG Q, YANG Y, et al. Data sharing scheme of smart grid based on identity condition proxy re-encryption [J]. Electronics, 2023, 13(1): No.139.
|
[20] |
LIN S, CUI L, KE N. End-to-end encrypted message distribution system for the Internet of Things based on conditional proxy re-encryption [J]. Sensors, 2024, 24(2): No.438.
|
[21] |
ZHANG Y, ZHANG Z, JI S, et al. Conditional proxy re-encryption-based key sharing mechanism for clustered federated learning [J]. Electronics, 2024, 13(5): No.848.
|
[22] |
ZENG P, CHOO K K R. A new kind of conditional proxy re-encryption for secure cloud storage [J]. IEEE Access, 2018, 6: 70017-70024.
|
[23] |
李兆斌,张璐,赵洪,等.基于无证书的门限条件代理重加密方案[J].北京邮电大学学报,2023, 46(1): 44-49, 83.
|
|
LI Z B, ZHANG L, ZHAO H, et al. Certificateless threshold-based conditional proxy re-encryption scheme [J]. Journal of Beijing University of Posts and Telecommunications, 2023, 46(1): 44-49, 83.
|
[24] |
尚龙飞,王华杰,徐露.基于条件代理重加密的区块链医疗数据共享模型[J].现代电子技术,2024, 47(1): 78-83.
|
|
SHANG L F, WANG H J, XU L. Blockchain medical data sharing model based conditional proxy re-encryption [J]. Modern Electronics Technique, 2024, 47(1): 78-83.
|
[25] |
翟社平,陆娴婧,霍媛媛,等.一种改进条件广播代理重加密的数据共享方案[J].西安电子科技大学学报,2024, 51(2): 224-238.
|
|
ZHAI S P, LU X J, HUO Y Y, et al. Improved data sharing scheme based on conditional broadcast proxy re-encryption [J]. Journal of Xidian University, 2024, 51(2): 224-238.
|
[26] |
LU Y, LI J. Lightweight public key authenticated encryption with keyword search against adaptively-chosen-targets adversaries for mobile devices [J]. IEEE Transactions on Mobile Computing, 2022, 21(12): 4397-4409.
|