[1]Arya S, Dwivedi S K, Ansar SA, et al. Integrating IoT with cloud computing and big data analytics: Security perspective[C] Proc of AIP Conference. New York: AIP Publishing, 2023[2]Guo Y, Lu Z, Ge H, et al. Revocable blockchainaided attributebased encryption with escrowfree in cloud storage[J]. IEEE Trans on Computers, 2023, 72(7): 19011912[3]Gupta R, Kanungo P, Dagdee N, et al.Secured and privacypreserving multiauthority access control system for cloudbased healthcare data sharing[J]. Sensors, 2023, 23(5): 2617[4]彭浩楠, 唐明环, 查奇文, 等. 云计算场景商用密码应用研究[J]. 信息安全研究, 2023, 9(4): 375381[5]Zheng Yuliang. Digital signcryption or how to achieve cost (signature & encryption)cost (signature)+cost (encryption)[C] Proc of the 17th Annual Int Cryptology Conference. Berlin: Springer, 1997: 165179[6]Gagné M, Narayan S, SafaviNaini R. Threshold attributebased signcryption[C] Proc of Int Conf on Security and Cryptography for Networks. Berlin: Springer, 2010: 154171[7]Belguith S, Kaaniche N, Hammoudeh M, et al. Proud: Verifiable privacypreserving outsourced attribute based signcryption supporting access policy update for cloud assisted IoT applications[J]. Future Generation Computer Systems, 2020, 111: 899918[8]Eltayieb N, Elhabob R, Hassan A, et al. A blockchainbased attributebased signcryption scheme to secure data sharing in the cloud[J]. Journal of Systems Architecture, 2020, 102: 101653[9]Deng F, Wang Y, Peng L, et al. Revocable cloudassisted attributebased signcryption in personal health system[J]. IEEE Access, 2019, 7: 120950120960[10]陈曦, 李勇, 李如先. 一种支持细粒度授权的数据安全共享方案[J]. 信息安全研究, 2023, 9(7): 667674[11]Ji H, Zhang H, Shao L, et al. An efficient attributebased encryption scheme based on SM9 encryption algorithm for dispatching and control cloud[J]. Connection Science, 2021, 33(4): 10941115[12]Shamir A. How to share a secret[J]. Communications of the ACM, 1979, 22(11): 612613[13]Waters B. Ciphertextpolicy attributebased encryption: An expressive, efficient, and provably secure realization[C] Proc of Int Workshop on Public Key Cryptography. Berlin: Springer, 2011: 5357[14]Yiliang H, Wanyi L. Attribute based generalized signcryption for online social network[C] Proc of the 34th Control Conference (CCC). Piscataway, NJ: IEEE, 2015: 64346439[15]Rao Y S. A secure and efficient ciphertextpolicy attributebased signcryption for personal health records sharing in cloud computing[J]. Future Generation Computer Systems, 2017, 67: 133151
|