| [1]黄穗, 陈丽炜, 范冰冰. 基于CPABE和区块链的数据安全共享方法[J]. 计算机系统应用, 2019, 28(11): 7986[2]Sahai A, Waters B.Fuzzy identitybased encryption[G] LNCS 3494: Advances in Cryptology—EUROCRYPT 2005. Berlin: Springer, 2005: 457473[3]Goyal V, Pandey O, Sahai A, et al. Attributebased encryption for finegrained access control of encrypted data[C] Proc of the 13th ACM Conf on Computer and Communications Security. New York: ACM, 2006: 8998[4]Zhang Y, Chen X, Li J, et al. Attributebased data sharing with flexible and direct revocation in cloud computing[J]. KSII Trans on Internet and Information Systems (TIIS), 2014, 8(11): 40284049[5]Cui H, Deng R H, Li Y, et al. Serveraided revocable attributebased encryption[G] LNCS 9879: Proc of the 21st European Symp on Research in Computer Security. Berlin: Springer, 2016: 570587[6]Song D X, Wagner D, Perrig A. Practical techniques for searches on encrypted data[C] Proc of the 2000 IEEE Symp on Security and Privacy. Los Alamitos, CA: IEEE Computer Society, 2000: 4455[7]Qiu S, Liu J, Shi Y, et al. Hidden policy ciphertextpolicy attributebased encryption with keyword search against keyword guessing attack[J]. Science China Information Sciences, 2017, 60(5): 112[8]王鹏翩, 冯登国, 张立武. 一种支持完全细粒度属性撤销的CPABE方案[J]. 软件学报, 2012, 23(10): 28052816[9]Zheng K, Ding C, Wang J. A secure datasharing scheme for privacypreserving supporting nodeedgecloud collaborative computation[J]. Electronics, 2023, 12(12): 2737[10]Tan S Y, Yeow K W, Hwang S O. Enhancement of a lightweight attributebased encryption scheme for the Internet of Things[J]. IEEE Internet of Things Journal, 2019, 6(4): 63846395[11]Han D, Pan N, Li K C. A traceable and revocable ciphertextpolicy attributebased encryption scheme based on privacy protection[J]. IEEE Trans on Dependable and Secure Computing, 2020, 19(1): 316327[12]Liu C W, Hsien W F, Yang C C, et al. Asurvey of attributebased access control with user revocation in cloud data storage[J]. International Journal of Network Security, 2016, 18(5): 900916[13]Li J, Wang X, Chen K, et al. Attributebased encryption with efficient revocation[C] Proc of the 17th ACM Conf on Computer and Communications Security. New York: ACM, 2010: 457468[14]张嘉伟, 马建峰, 马卓, 等. 云计算中基于时间和隐私保护的可撤销 可追踪的数据共享方案[J]. 通信学报, 2021, 42(10): 8194[15]Feng T, Miao S, Liu C, et al. Verifiable keyword search encryption scheme that supports revocation of attributes[J]. Symmetry, 2023, 15(4): 914926[16]王继锋, 王国峰. 边缘计算模式下密文搜索与共享技术研究[J]. 通信学报, 2022, 43(4): 227238[17]Zheng K, Ding C, Wang J. A secure datasharing scheme for privacypreserving supporting nodeedgecloud collaborative computation[J]. Electronics, 2023, 12(12): 27372759[18]Salim M M, Kim I, Doniyor U, et al. Homomorphic encryption based privacypreservation for iomt[J]. Applied Sciences, 2021, 11(18): 87578771[19]Tu S, Huang F, Zhang S, et al. Ciphertextpolicy attributebased encryption for securing IoT devices in fog computing[C] Proc of the 2022 Int Conf on Computer, Information and Telecommunication Systems (CITS). Piscataway, NJ: IEEE, 2022: 17[20]Liu J, Li Y, Sun R, et al. Efficient multikeyword attributebased searchable encryption scheme through cloudedge coordination[J]. IEEE Internet of Things Journal, 2022, 9(19): 1865018662[21]Zhou Z, Huang D. Efficient and secure data storage operations for mobile cloud computing[C] Proc of the 8th Int Conf on Network and Service Management (CNSM) and 2012 Workshop on Systems Virtualization Management (SVM). Piscataway, NJ: IEEE, 2012: 3745 |