共 21 条
- [1] ZHANG Y H, DENG R H, XU S M, Et al., Attribute-based encryption for cloud computing access control: a survey, ACM Computing Surveys, 53, 4, pp. 1-41, (2021)
- [2] SAHAI A, WATERS B., Fuzzy identity-based encryption, Advances in Cryptology, pp. 457-473, (2005)
- [3] BETHENCOURT J, SAHAI A, WATERS B., Ciphertext-policy attribute-based encryption, Proceedings of the 2007 IEEE Symposium on Security and Privacy, pp. 321-334, (2007)
- [4] YU S C, WANG C, REN K, Et al., Achieving secure, scalable, and fine-grained data access control in cloud computing, Proceedings of IEEE INFOCOM, pp. 1-9, (2010)
- [5] ZHANG J W, MA J F, MA Z, Et al., Time-based and privacy protection revocable and traceable data sharing scheme in cloud computing, Journal on Communications, 42, 10, pp. 81-94, (2021)
- [6] GUO L F, XING X M, GUO H., An efficient traceable and revocable attribute-based encryption scheme in cloud storage, Journal of Cryptologic Research, 10, 1, pp. 131-145, (2023)
- [7] NING J T, HUANG X Y, WEI L F, Et al., Tracing malicious insider in attribute-based cloud data sharing, Chinese Journal of Computers, 45, 7, pp. 1431-1445, (2022)
- [8] LUO W P, FENG C S, ZOU L P, Et al., Attribute-based encryption scheme with fast encryption, Journal of Software, 31, 12, pp. 3923-3936, (2020)
- [9] FENG T, CHEN L Q, FANG J L, Et al., Blockchain data sharing scheme based on localized difference privacy and attribute-based searchable encryption, Journal on Communications, 44, 5, pp. 224-233, (2023)
- [10] MIAO Y B, TONG Q Y, CHOO K K R, Et al., Secure online/offline data sharing framework for cloud-assisted industrial Internet of things, IEEE Internet of Things Journal, 6, 5, pp. 8681-8691, (2019)