[1]LIN H Y, TZENG W G. A secure decentralized erasure code for distributed network storage [J]. IEEE Transactions on Parallel and Distributed Systems, 2010, 21(11): 1586-1594.[2]LIN H Y, TZENG W G. A secure erasure code-based cloud storage system with secure data forwarding [J]. IEEE Transactions on Parallel and Distributed Systems, 2012, 23(6): 995-1003.[3]SAHAI A, WATERS B. Fuzzy identity-based encryption [C]// EUROCRYPT2005: Proceedings of the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, LNCS 3494, Berlin: Springer-Verlag, 2005: 457-473.[4]GOYAL V, PANDEY O, SAHAI A, et al. Attribute-based encryption for fine-grained access control of encrypted data [C]// Proceedings of the 13th ACM Conference on Computer and Communications Security. New York: ACM Press, 2006: 89-98.[5]BETHENCOURT J, SAHAI A, WATERS B. Ciphertext-policy attribute-based encryption [C]// Proceedings of 2007 IEEE Symposium on Security and Privacy. Washington, DC :IEEE Computer Society, 2007: 321-334.[6]GE A J, ZHANG R, CHEN C, et al. Threshold ciphertext policy attribute-based encryption with constant size ciphertexts [C]// Proceedings of the 17th Australasian Conference on Information Security and Privacy. Berlin: Springer-Verlag, 2012: 336-349.[7]HERRANZ J, LAGUILLAUMIE F, RAFOLS C. Constant size ciphertexts in threshold attribute-based encryption [C]// PKC2010: Proceedings of the 13th International Conference on Practice and Theory in Public Key Cryptography, LNCS 6056. Berlin: Springer-Verlag, 2010: 19-34.[8]GOYAL V, JAIN A, PANDEY O, et al. Bounded ciphertext policy attribute-based encryption [C]// ICALP2008: Proceedings of the 35th International Colloquium on Automata, Languages and Programming, LNCS 5126. Berlin: Springer-Verlag, 2008: 579-591.[9]WATERS B. Ciphertext-policy attribute-based encryption: an ex-pressive, efficient, and provably secure realization [C]// Proceedings of the 14th International Conference on Practice and Theory in Public Key Cryptography Conference on Public Key Cryptography. Berlin: Springer-Verlag, 2011: 53-70.[10]CHASE M. Multi-authority attribute based encryption [C]// TCC2007: Proceedings of the 4th Conference on Theory of Cryptography, LNCS 4392. Berlin: Springer-Verlag, 2007: 515-534.[11]DIMAKIS A G, PRABHAKARAN V, RAMCHANDRAN K. Decentralized erasure codes for distributed networked storage [J]. IEEE/ACM Transactions on Networking-Special Issue on Networking and Information Theory, 2006, 14(SI): 2809-2816.[12]SHAMIR A. How to share a secret [J]. Communications of the ACM, 1979, 22(11): 612-613. |