共 18 条
- [1] Xu P., Jin H., Zou D., Cryptographic data security and privacy in cloud storage, Communications of the China Computer Fedaration, 8, 7, pp. 22-28, (2012)
- [2] Yu S., Wang C., Ren K., Et al., Achieving secure, scalable, and fine-grained data access control in cloud computing, Proc of IEEE Conf on Computer Communications (INFOCOM'10), pp. 15-19, (2010)
- [3] Goyal V., Pandey O., Sahai A., Et al., Attribute-based encryption for fine-grained access control of encrypted data, Proc of ACM Conf on Computer and Communications Security (CCS'06), pp. 89-98, (2006)
- [4] Blaze M., Bleumer G., Strauss M., Divertible protocols and atomic proxy cryptography, LNCS 1403: Proc of Int Conf on the Theory and Application of Cryptographic Techniques, pp. 127-144, (1998)
- [5] Liu Q., Wang G., Wu J., Efficient sharing of secure cloud storage services, Proc of the 10th IEEE Int Conf on Computer and Information Technology, pp. 922-929, (2010)
- [6] Lu Z., Zhang M., Feng D., Cryptographic access control scheme for cloud storage, Journal of Frontiers of Computer Science and Technology, 5, 9, pp. 835-845, (2011)
- [7] Bethencourt J., Sahai A., Waters B., Ciphertext-policy attribute-based encryption, Proc of the 2007 IEEE Symp on Security and Privacy, pp. 321-334, (2007)
- [8] Cheng Y., Wang Z., Ma J., Et al., Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage, Journal of Zhejiang University-SCIENCE C (Computers & Electronics), 14, 2, pp. 85-97, (2013)
- [9] Samanthula B.K., Howser G., Elmehdwi Y., Et al., An efficient and secure data sharing framework using homomorphic encryption in the cloud, Proc of the 1st Int Workshop on Cloud Intelligence (Cloud-I'12), (2012)
- [10] Han J., Susilo W., Mu Y., Identity-based secure distributed data storage schemes, IEEE Trans on Computers, 63, 4, pp. 941-953, (2014)