[1]国家市场监督管理总局. GBT 38638—2020 信息安全技术 可信计算 可信计算体系结构[S]. 北京: 中国标准出版社, 2020[2]Li Z P, Ma C G, Wang D. Achieving multihop PRE via branching program[J]. IEEE Trans on Cloud Computing, 2020, 8(1): 4558[3]Ge C P, Liu Z, Xia J Y, et al. Revocable identitybased broadcast proxy reencryption for data sharing in clouds[J]. IEEE Trans on Dependable and Secure Computing, 2021, 18(3): 12141226[4]Liang X J, Weng J, Yang A J, et al. Attributebased conditional proxy reencryption in the standard model under LWE[C] Proc of the Computer Security—ESORICS 2021. Cham: Springer, 2021: 147168[5]Dttling N, Nishimaki R. Universal proxy reencryption[C] Proc of the PublicKey Cryptography—PKC. Cham: Springer, 2021: 512542[6]王于丁, 杨家海, 徐聪, 等. 云计算访问控制技术研究综述[J]. 软件学报, 2015, 26(5): 11291150 |