[1]董贵山, 张文科, 罗影, 等. 工业互联网密码应用研究[J]. 信息安全研究, 2022, 8(6): 554562[2]Ghazouani S, Slimani Y. A survey on cloud service description[J]. Journal of Network and Computer Applications, 2017, 91: 6174[3]冯政鑫, 唐寅, 韩磊, 等. 基于区块链的敏感数据安全共享方案[J]. 信息安全研究, 2022, 8(4): 364373[4]Agrawal H, Sharma M. Implementation and analysis of various symmetric cryptosystems[J]. Indian Journal of science and Technology, 2010, 3(12): 11731176[5]Lozupone V. Analyze encryption and public key infrastructure (PKI)[J]. International Journal of Information Management, 2018, 38(1): 4244[6]Mittal S, Bansal A, Gupta D, et al. Using identitybased cryptography as a foundation for an effective and secure cloud model for ehealth[JOL]. Computational Intelligence and Neuroscience, 2022 [20250411]. https:doi.org10.115520227016554[7]Qu H, Yan Z, Lin X, et al. Certificateless public key encryption with equality test[J]. Information Sciences, 2018, 462: 7692[8]Zhang Y, Deng R H, Xu S, et al. Attributebased encryption for cloud computing access control: A survey[J]. ACM Computing Surveys (CSUR), 2020, 53(4): 141[9]Liu Y, Ren Y, Wang Q, et al. The development of proxy reencryption[J]. Journal of Cybersecurity, 2020, 2(1): 18[10]Liang K, Au M H, Liu J K, et al. A secure and efficient ciphertextpolicy attributebased proxy reencryption for cloud data sharing[J]. Future Generation Computer Systems, 2015, 52(11): 95108[11]Wungpornpaiboon G, Vasupongayya S. Twolayer ciphertextpolicy attributebased proxy reencryption for supporting PHR delegation[C] Proc of the 2015 Int Computer Science and Engineering Conference (ICSEC). Piscataway, NJ: IEEE, 2015: 16[12]Doshi N. An enhanced approach for CPABE with proxy reencryption in IoT paradigm[J]. Jordanian Journal of Computers and Information Technology, 2022, 8(3): 232242[13]Jiang Y, Susilo W, Mu Y, et al. Ciphertextpolicy attributebased encryption supporting access policy update and its extension with preserved attributes[J]. International Journal of Information Security, 2017, 17(1): 116[14]Li J, Yu Q, Zhang Y, et al. Keypolicy attributebased encryption against continual auxiliary input leakage[J]. Information Sciences, 2019, 470: 175188[15]Guo S, Zeng Y, Wei J, et al. Attributebased reencryption scheme in the standard model[J]. Wuhan University Journal of Natural Sciences, 2008, 13(5): 621625[16]Liang K, Fang L, Susilo W, et al. A ciphertextpolicy attributebased proxy reencryption with chosenciphertext security[C] Proc of the 5th Int Conf on Intelligent Networking and Collaborative Systems. Piscataway, NJ: IEEE, 2013: 552559[17]Chung P S, Liu C W, Hwang M S. A study of attributebased proxy reencryption scheme in cloud environments[J]. International Journal of Network Security, 2014, 16(1): 113[18]Kawai Y. Outsourcing the reencryption key generation: Flexible ciphertextpolicy attributebased proxy reencryption[C] Proc of the 11th Int Conf on Information Security Practice and Experience. Berlin: Springer, 2015: 301315[19]Yasumura Y, Imabayashi H, Yamana H. Attributebased proxy reencryption method for revocation in cloud storage: Reduction of communication cost at reencryption[C] Proc of the 3rd IEEE Int Conf on Big Data Analysis (ICBDA). Piscataway, NJ: IEEE, 2018: 312318[20]Shi Y, Liu J, Han Z, et al. Attributebased proxy reencryption with keyword search[J]. PloS One, 2014, 9(12): e116325[21]Zhang Y, Li J, Chen X, et al. Anonymous attributebased proxy reencryption for access control in cloud computing[J]. Security and Communication Networks, 2016, 9(14): 23972411[22]Xu X L, Zhang Q T, Zhou J L. NCMACPABE: Noncentered multiauthority proxy reencryption based on CPABE for cloud storage systems[J]. Journal of Central South University, 2017, 24(4): 807818[23]陈曦, 李勇, 李如先. 一种支持细粒度授权的数据安全共享方案[J]. 信息安全研究, 2023, 9(7): 667674[24]Ge C, Susilo W, Baek J, et al. A verifiable and fair attributebased proxy reencryption scheme for data sharing in clouds[J]. IEEE Trans on Dependable and Secure Computing, 2021, 19(5): 29072919[25]Zou J, Ye B, Qu L,et al. A proofoftrust consensus protocol for enhancing accountability in crowdsourcing services[J]. IEEE Trans on Services Computing, 2018, 12(3): 429445[26]Feng J, Zhao X, Chen K, et al. Towards randomhonest miners selection and multiblocks creation: Proofofnegotiation consensus mechanism in blockchain networks[J]. Future Generation Computer Systems, 2022, 105: 248258 |