1 |
BONEH D, DI CRESCENZO G, OSTROVSKY R, et al. Public key encryption with keyword search[C]// Proceedings of the 2004 Annual International Conference on the Theory and Applications of Cryptographic Techniques, LNCS 3027. Berlin: Springer, 2004: 506-522.
|
2 |
FANG L M, SUSILO W, GE C P, et al. Public key encryption with keyword search secure against keyword guessing attacks without random oracle[J]. Information Sciences, 2013, 238: 221-241. 10.1016/j.ins.2013.03.008
|
3 |
白平,张薇,李聪,等. 支持用户撤销的可验证密文检索方案[J]. 计算机应用, 2018, 38(6): 1640-1643, 1647.
|
|
BAI P, ZHANG W, LI C, et al. Verifiable ciphertext retrieval scheme with user revocation[J]. Journal of Computer Applications, 2018, 38(6): 1640-1643, 1647.
|
4 |
SAHAI A, WATERS B. Fuzzy identity-based encryption[C]// Proceedings of the 2005 Annual International Conference on the Theory and Applications of Cryptographic Techniques, LNCS 3494. Berlin: Springer, 2005: 457-473.
|
5 |
GOYAL V, PANDEY O, SAHAI A, et al. Attribute-based encryption for fine-grained access control of encrypted data[C]// Proceedings of the 13th ACM Conference on Computer and Communications Security. New York: ACM, 2006: 89-98. 10.1145/1180405.1180418
|
6 |
WATERS B. Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization[C]// Proceedings of 2011 International Conference on Practice and Theory in Public Key Cryptography, LNCS 6571. Berlin: Springer, 2011: 53-70.
|
7 |
王海勇,彭垚,郭凯璇. 云存储中基于代理重加密的CP-ABE访问控制方案[J]. 计算机应用, 2019, 39(9): 2611-2616. 10.11772/j.issn.1001-9081.2019020356
|
|
WANG H Y, PENG Y, GUO K X. CP-ABE access control scheme based on proxy re-encryption in cloud storage[J]. Journal of Computer Applications, 2019, 39(9): 2611-2616. 10.11772/j.issn.1001-9081.2019020356
|
8 |
LIANG K T, SUSILO W. Searchable attribute-based mechanism with efficient data sharing for secure cloud storage[J]. IEEE Transactions on Information Forensics and Security, 2015, 10(9): 1981-1992. 10.1109/tifs.2015.2442215
|
9 |
ZHENG Q J, XU S H, ATENIESE G. VABKS: verifiable attribute-based keyword search over outsourced encrypted data[C]// Proceedings of 2014 IEEE International Conference on Computer Communications. Piscataway: IEEE, 2014: 522-530. 10.1109/infocom.2014.6847976
|
10 |
SUN W H, YU S C, LOU W J, et al. Protecting your right: Attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud[J]. IEEE Transactions on Parallel and Distributed Systems, 2016, 27(4): 1187-1198. 10.1109/tpds.2014.2355202
|
11 |
MIAO Y B, DENG R H, LIU X M, et al. Multi-authority attribute-based keyword search over encrypted cloud data[J]. IEEE Transactions on Dependable and Secure Computing, 2021 18(4): 1667-1680.
|
12 |
CHAUDHARI P, DAS M L. Privacy preserving searchable encryption with fine-grained access control[J]. IEEE Transactions on Cloud Computing, 2021, 9(2): 753-762. 10.1109/tcc.2019.2892116
|
13 |
MAMTA, GUPTA B. An attribute-based searchable encryption scheme for non-monotonic access structure[M]// Handbook of Research on Intrusion Detection Systems. Hershey, PA: IGI Global, 2020: 263-283. 10.4018/978-1-7998-2242-4.ch013
|
14 |
MAMTA, GUPTA B. An attribute-based keyword search for m-health networks[J]. Journal of Computer Virology and Hacking Techniques, 2021, 17(1): 21-36. 10.1007/s11416-020-00361-z
|
15 |
GE C P, SUSILO W, LIU Z, et al. Secure keyword search and data sharing mechanism for cloud computing[J]. IEEE Transactions on Dependable and Secure Computing, 2021, 18(6): 2787-2800.
|
16 |
GREEN M, HOHENBERGER S, WATERS B. Outsourcing the decryption of ABE ciphertexts[C]// Proceedings of the 20th USENIX Security Symposium. Berkeley: USENIX Association, 2011: 523-538. 10.1109/ms.2011.67
|
17 |
LAI J Z, DENG R H, GUAN C W, et al. Attribute-based encryption with verifiable outsourced decryption[J]. IEEE Transactions on Information Forensics and Security, 2013, 8(8): 1343-1354. 10.1109/tifs.2013.2271848
|
18 |
LIN S Q, ZHANG R, MA H, et al. Revisiting attribute-based encryption with verifiable outsourced decryption[J]. IEEE Transactions on Information Forensics and Security, 2015, 10(10): 2119-2130. 10.1109/tifs.2015.2449264
|
19 |
MAO X P, LAI J Z, MEI Q X, et al. Generic and efficient constructions of attribute-based encryption with verifiable outsourced decryption[J]. IEEE Transactions on Dependable and Secure Computing, 2016, 13(5): 533-546. 10.1109/tdsc.2015.2423669
|
20 |
MA H, ZHANG R, WAN Z G, et al. Verifiable and exculpable outsourced attribute-based encryption for access control in cloud computing[J]. IEEE Transactions on Dependable and Secure Computing, 2017, 14(6): 679-692. 10.1109/tdsc.2015.2499755
|
21 |
明洋,何宝康. 支持属性撤销的可验证外包的多授权属性加密方案[J]. 计算机应用, 2019, 39(12): 3556-3562.
|
|
MING Y, HE B K. Attribute revocation and verifiable outsourcing supported multi-authority attribute-based encryption scheme[J]. Journal of Computer Applications, 2019, 39(12): 3556-3562.
|
22 |
CUI J, ZHOU H, XU Y, et al. OOABKS: online/offline attribute-based encryption for keyword search in mobile cloud[J]. Information Sciences, 2019, 489: 63-77. 10.1016/j.ins.2019.03.043
|
23 |
XU Q, TAN C X, ZHU W Y, et al. Decentralized attribute-based conjunctive keyword search scheme with online/offline encryption and outsource decryption for cloud computing[J]. Future Generation Computer Systems, 2019, 97: 306-326. 10.1016/j.future.2019.02.067
|
24 |
GUO F C, MU Y, SUSILO W, et al. CP-ABE with constant-size keys for lightweight devices[J]. IEEE Transactions on Information Forensics and Security, 2014, 9(5): 763-771. 10.1109/tifs.2014.2309858
|
25 |
AKINYELE J A, GARMAN C, MIERS I, et al. Charm: a framework for rapidly prototyping cryptosystems[J]. Journal of Cryptographic Engineering, 2013, 3(2): 111-128. 10.1007/s13389-013-0057-3
|