[1] SAHAI A, WATERS B. Fuzzy identity based encryption [C]//Proceedings of 2005 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Berlin: Springer-Verlag, 2005: 457-473. [2] GOYAL V, PANDEY O, SAHAI A, et al. Attribute-based encryption for fine-grained access control of encrypted data [C]//Proceedings of the 13th ACM Conference on Computer and Communications Security. New York: ACM, 2006: 89-98. [3] TANG Y, LEE P, LIU J, et al. Secure overlay cloud storage with access control and assured deletion [J]. IEEE Transactions on Dependable and Secure Computing, 2012, 9(6):903-916. [4] HONG C, ZHANG M, FENG D. AB-ACCS: a cryptographic access control scheme for cloud storage [J]. Journal of Computer Research and Development, 2010, 47(Z1): 259-265.(洪澄, 张敏, 冯登国.AB-ACCS:一种云存储密文访问控制方法[J].计算机研究与发展, 2010, 47(Z1):259-265.) [5] HONG C, ZHANG M, FENG D. Achieving efficient dynamic cryptographic access control in cloud storage [J]. Journal on Communications, 2011, 32(7): 125-132.(洪澄, 张敏, 冯登国.面向云存储的高效动态密文访问控制方法[J].通信学报, 2011, 32(7):125-132.) [6] WEI J, LIU W, HU X. Forward-secure ciphertext-policy attribute-based encryption scheme [J]. Journal on Communications, 2014, 35(7): 38-45.(魏江宏, 刘文芬, 胡学先.前向安全的密文策略基于属性加密方案[J].通信学报, 2014, 35(7):38-45.) [7] WANG P, FENG D, ZHANG L. CP-ABE scheme supporting fully fine-grained attribute revocation [J]. Journal of Software, 2012, 23(10): 2805-2816.(王鹏翩, 冯登国, 张立武.一种支持完全细粒度属性撤销的CP-ABE方案[J].软件学报, 2012, 23(10):2805-2816.) [8] YU S, WANG C, REN K, et al. Achieving secure, scalable and fine-grained data access control in cloud computing [C]//Proceedings of the 2010 INFOCOM. Piscataway: IEEE, 2010: 1-9. [9] HUR J, NOH D K. Attribute-based access control with efficient revocation in data outsourcing systems [J]. IEEE Transactions on Parallel and Distributed Systems, 2011, 22(7): 1214-1221. [10] ATTRAPADUNG N, IMAI H. Conjunctive broadcast and attribute-based encryption [C]//Proceedings of the Third International Conference on Pairing-Based Cryptography — Pairing 2009, LNCS 5671. Berlin: Springer, 2009: 248-265 [11] WAN Z, LIU J, DENG R H. HASBE: a hierarchical attribute-based solution for flexible and scalable access control in cloud computing [J]. IEEE Transactions on Information Forensics and Security, 2012, 7(2): 743-754. [12] SAHAI A, SEYALIOGLU H, WATERS B, et al. Dynamic credentials and ciphertext delegation for attribute-based encryption [C]//Proceedings of the 32nd Annual Cryptology Conference on Advances in Cryptology — CRYPTO 2012, LNCS 7417. Berlin: Springer, 2012: 199-217. [13] LU R, LIN X, SHI Z, et al. PLAM: A privacy-preserving framework for local-area mobile social networks [C]//Proceedings of the INFOCOM 2014. Piscataway: IEEE, 2014: 763-771. [14] NAOR D, NAOR M, LOTSPIECH J. Revocation and tracing schemes for stateless receivers [C]//Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology — CRYPTO 2001, LNCS 2139. Berlin: Springer, 2001: 41-62. |