1 |
Wikipedia. Cloud computing[EB/OL]. [2021-02-21].. 10.1109/csc.2011.6138555
|
2 |
SAHAI A, WATERS B R. Fuzzy identity-based encryption[C]// Proceedings of the 2005 Annual International Conference on Theory and Applications of Cryptographic Techniques, LNSC 3494. Berlin: Springer, 2005: 457-473.
|
3 |
GOYAL V, PANDEY O, SAHAI A, et al. Attribute-based encryption for fine-grained access control of encrypted data[C]// Proceedings of the 13th ACM Conference on Computer and Communications Security. New York: ACM, 2006: 89-98. 10.1145/1180405.1180418
|
4 |
BETHENCOURT J, SAHAI A, WATERS B. Ciphertext-policy attribute-based encryption[C]// Proceedings of the 2007 IEEE Symposium on Security and Privacy. Piscataway: IEEE, 2007: 321-334. 10.1109/sp.2007.11
|
5 |
LEWKO A, OKAMOTO T, SAHAI A, et al. Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption[C]// Proceedings of the 2010 Annual International Conference on the Theory and Applications of Cryptographic Techniques, LNSC 6110. Berlin: Springer, 2010: 62-91.
|
6 |
OKAMOTO T, TAKASHIMA K. Fully secure functional encryption with general relations from the decisional linear assumption[C]// Proceedings of the 2010 Annual Cryptology Conference, LNSC 6223. Berlin: Springer, 2010: 191-208.
|
7 |
CHEN X F, SUSILO W, LI J, et al. Efficient algorithms for secure outsourcing of bilinear pairings[J]. Theoretical Computer Science, 2015, 562: 112-121. 10.1016/j.tcs.2014.09.038
|
8 |
ODELU V, DAS A K. Design of a new CP-ABE with constant-size secret keys for lightweight devices using elliptic curve cryptography[J]. Security and Communication Networks, 2016, 9(17):4048-4059. 10.1002/sec.1587
|
9 |
WATERS B. Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization[C]// Proceedings of the 2011 International Workshop on Public Key Cryptography, LNSC 6571. Berlin: Springer, 2011:53-70.
|
10 |
CHEUNG L, NEWPORT C. Provably secure ciphertext policy ABE[C]// Proceedings of the 14th ACM Conference on Computer and Communications Security. New York: ACM, 2007: 456-465. 10.1145/1315245.1315302
|
11 |
LI L, GU T, CHANG T, et al. A ciphertext-policy attribute-based encryption based on an ordered binary decision diagram[J]. IEEE Access, 2017, 5: 1137-1145. 10.1109/access.2017.2651904
|
12 |
丁晟,曹进,李晖. 基于OBDD访问结构的无配对CP-ABE方案[J]. 通信学报, 2019, 40(12):1-8. 10.11959/j.issn.1000-436x.2019234
|
|
DING S, CAO J, LI H. Efficient pairing-free CP-ABE based on ordered binary decision diagram[J]. Journal on Communications, 2019, 40(12): 1-8. 10.11959/j.issn.1000-436x.2019234
|
13 |
PIRRETTI M, TRAYNOR P, McDANIEL P, et al. Secure attribute-based systems[J]. Journal of Computer Security, 2010, 18(5): 799-837. 10.3233/jcs-2009-0383
|
14 |
HUR J, NOH D K. Attribute-based access control with efficient revocation in data outsourcing systems[J]. IEEE Transactions on Parallel and Distributed Systems, 2011, 22(7): 1214-1221. 10.1109/tpds.2010.203
|
15 |
YU S, WANG C, REN K, et al. Attribute based data sharing with attribute revocation[C]// Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security. New York: ACM, 2010:261-270. 10.1145/1755688.1755720
|
16 |
ZHANG Y H, CHEN X F, LI J, et al. FDR-ABE: attribute-based encryption with flexible and direct revocation[C]// Proceedings of the 5th International Conference on Intelligent Networking and Collaborative Systems. Piscataway: IEEE, 2013:38-45. 10.1109/incos.2013.16
|
17 |
LI J G, YAO W, HAN J G, et al. User collusion avoidance CP-ABE with efficient attribute revocation for cloud storage[J]. IEEE Systems Journal, 2018, 12(2): 1767-1777. 10.1109/jsyst.2017.2667679
|
18 |
XIANG G L, LI B L, FU X N, et al. An attribute revocable CP-ABE scheme[C]// Proceedings of the 7th International Conference on Advanced Cloud and Big Data. Piscataway: IEEE, 2019: 198-203. 10.1109/cbd.2019.00044
|
19 |
高嘉昕. 云计算环境下的可撤销属性访问控制协议的研究[D]. 济南:山东大学, 2020.
|
|
GAO J X. Attribute-based encryption with attribute revocation in cloud computing[D]. Jinan: Shandong University, 2020.
|
20 |
李学俊,张丹,李晖. 可高效撤销的属性基加密方案[J]. 通信学报, 2019, 40(6):32-39. 10.11959/j.issn.1000-436x.2019150
|
|
LI X J, ZHANG D, LI H. Efficient revocable attribute-based encryption scheme[J]. Journal on Communications, 2019, 40(6):32-39. 10.11959/j.issn.1000-436x.2019150
|
21 |
ZHANG Y H, ZHENG D, DENG R H. Security and privacy in smart health: efficient policy-hiding attribute-based access control[J]. IEEE Internet of Things Journal, 2018, 5(3): 2130-2145. 10.1109/jiot.2018.2825289
|
22 |
BRYANT R E. Graph-based algorithms for Boolean function manipulation[J]. IEEE Transactions on Computers, 1986, C-35(8): 677-691. 10.1109/tc.1986.1676819
|
23 |
WANG S P, GUO K K, ZHANG Y L. Traceable ciphertext-policy attribute-based encryption scheme with attribute level user revocation for cloud storage[J]. PLoS ONE, 2018, 13(9): No.e0203225. 10.1371/journal.pone.0203225
|
24 |
LEE C Y. Representation of switching circuits by binary-decision programs[J]. The Bell System Technical Journal, 1959, 38(4): 985-999. 10.1002/j.1538-7305.1959.tb01585.x
|