[1] SAHAI A, WATERS B. Fuzzy identity-based encryption[C]//EUROCRYPT'05:Proceedings of the 24th Annual International Conference on Theory and Applications of Cryptographic Techniques, LNCS 3494. Berlin:Springer, 2005:457-473. [2] SHAMIR A. Identity-based cryptosystems and signature schemes[C]//CRYPTO 1984:Proceedings of the 1984 Workshop on the Theory and Application of Cryptographic Techniques, LNCS 196. Berlin:Springer, 1984:47-53. [3] BONEH D, FRANKLIN M K. Identity-based encryption from the Weil pairing[C]//CRYPTO'01:Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology, LNCS 2139. Berlin:Springer, 2001:213-229. [4] GOYAL V, PANDEY O, SAHAI A, et al. Attribute-based encryption for fine-grained access control of encrypted data[C]//CCS 2006:Proceedings of the 13th ACM conference on Computer and Communications Security. New York:ACM, 2006:89-98. [5] BETHENCOURT J, SAHAI A, WATERS B. Ciphertext-policy attribute-based encryption[C]//SP'07:Proceedings of the 2007 IEEE Symposium on Security and Privacy. Washington, DC:IEEE Computer Society, 2007:321-334. [6] WANG G J, LIU Q, WU J. Hierarchical attribute-based encryption for fine-grained access control in cloud storage services[C]//CCS'10:Proceedings of the 17th ACM Conference on Computer and Communications Security. New York:ACM, 2010:735-737. [7] LEWKO A, OKAMOTO T, SAHAI A, et al. Fully secure functional encryption:attribute-based encryption and (hierarchical) inner product encryption[C]//EUROCRYPT'10:Proceedings of the 29th Annual International Conference on Theory and Applications of Cryptographic Techniques, LNCS 6110. Berlin:Springer, 2010:62-91. [8] RUJ S, NAYAK A, STOJMENOVIC I. DACC:distributed access control in clouds[C]//Proceedings of the 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications. Washington, DC:IEEE Computer Society, 2011:91-98. [9] HUR J, NOH D K. Attribute-based access control with efficient revocation in data outsourcing systems[J]. IEEE Transactions on Parallel and Distributed Systems, 2011, 22(7):1214-1221. [10] 陈克非,翁健.云计算环境下数据安全与隐私保护[J].杭州师范大学学报(自然科学版),2014,13(6):561-570.(CHEN K F, WENG J. Data security and privacy protection in cloud computing[J]. Journal of Hangzhou Normal University (Natural Science Edition), 2014, 13(6):561-570.) [11] 刘团奇,张浩军,赵志鹏.一种云环境下基于身份的统一身份认证方案研究[J].中原工学院学报,2015,26(4):55-58.(LIU T Q, ZHANG H J, ZHAO Z P. A unified identity authentication in cloud with ID-based cryptography[J]. Journal of Zhongyuan University of Technology, 2015, 26(4):55-58.) [12] WAN Z G, LIU J, DENG R H. HASBE:a hierarchical attribute-based solution for flexible and scalable access control in cloud computing[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(2):743-754. |