[1] 黄勤龙, 马兆丰, 傅镜艺,等. 云计算环境中支持隐私保护的数字版权保护方案[J]. 通信学报, 2014(2):95-103
[2] Blaze M, Bleumer G, Strauss M. Divertible protocols and atomic proxy cryptography[C]// International Conference on the Theory and Applications of Cryptographic Techniques. Springer Berlin Heidelberg, 1998:127-144
[3] Ateniese G, Fu K, Green M, et al. Improved proxy re-encryption schemes with applications to secure distributed storage[J]. ACM Transactions on Information & System Security, 2006, 9(1):1-30
[4] Sahai A, Waters B. Fuzzy Identity-Based Encryption[C]// International Conference on Theory and Applications of Cryptographic Techniques. Springer-Verlag, 2005:457-473
[5] Emura K, Miyaji A, Nomura A, et al. A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length[C]// International Conference on Information Security Practice and Experience. Springer-Verlag, 2009:13-23
[6] JOUX Antoine. A One Round Protocol for Tripartite Diffie–Hellman[J]. Journal of Cryptology, 2004, 17(4):263-276
[7] Waters B. Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization[J]. Lecture Notes in Computer Science, 2011, 2008:321--334
[8] 陈剑洪, 陈克非, 龙宇,等. 密文策略的属性基并行密钥隔离加密[J]. 软件学报, 2012, 23(10):2795-2804
[9] 王永涛. 基于属性密码体制的相关研究[D]. 上海交通大学, 2011
[10] 冯登国, 赵险峰. 信息安全技术概论[M]. 电子工业出版社, 2014
[11] He X H, Liang L H, Ding J, et al. Advances in research on the role and mechanism of microRNAs in hepatic carcinogenesis[J]. Journal of Shanghai Jiaotong University, 2012, 32(9):1264-1268
[12] Hur J, Noh D K. Attribute-based access control with efficient revocation in data outsourcing systems[J]. IEEE Transactions on Parallel and Distributed Systems, 2011, 22(7): 1214-1221
[13] 陈亮, 杨庚, 屠袁飞. 混合云环境下基于属性的密文策 略加密方案[J]. 计算机应用, 2016, 36(7):1822-182
|