[1] 冯登国, 张敏, 张妍, 等. 云计算安全研究[J]. 软件学报, 2011, 22(1): 71-83.
Feng Dengguo, Zhang Min, ZhangYan, et al. Study on Cloud Computing Security[J]. Journal of Software, 2011, 22(1): 71-83.
[2] 朱旭东, 李晖, 郭祯. 云计算环境下加密图像检索[J]. 西安电子科技大学学报, 2014, 41(2): 152-158.
Zhu Xudong, Li Hui, Guo Zhen. Privacy-preserving Query over the Encrypted Image in Cloud Computing[J]. Journal of Xidian University, 2014, 41(2): 152-158.
[3] Sahai A, Waters B. Fuzzy Identity-based Encryption[C]//Proceedings of the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Berlin: Springer, 2005: 457-473.
[4] Waters B. Ciphertext-policy Attribute-based Encryption: an Expressive, Efficient, and Provably Secure Realization [C]//Proceedings of the 14th International Conference on Practice and Theory in Public Key Cryptography. Berlin: Springer, 2011: 53-70.
[5] Boldyreva A, Goyal V, Kumar V. Identity-based Encryption with Efficient Revocation [C]//Proceedings of the ACM Conference on Computer and Communications Security. New York: ACM, 2008: 417-426.
[6] Hur J, Noh D K. Attribute-based Access Control with Efficient Revocation in Data Outsourcing Systems[J]. IEEE Transactions on Parallel and Distributed Systems, 2011, 22(7): 1214-1221.
[7] Xie X, Ma H, Li J, et al. An Efficient Ciphertext-policy Attribute-based Access Control towards Revocation in Cloud Computing[J]. Journal of Universal Computer Science, 2013, 19(16): 2349-2367.
[8] Zhang Y, Chen X, Li J, et al. Anonymous Attribute-based Encryption Supporting Efficient Decryption Test[C]//Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security. New York: ACM, 2013: 511-516.
[9] Fan C I, Huang V S M, Rung H M. Arbitrary-state Attribute-based Encryption with Dynamic Membership[J]. IEEE Transactions on Computers, 2014, 63(8): 1951-1961.
[10] Atallah M J, Pantazopoulos K N, Rice J R, et al. Secure Outsourcing of Scientific Computations[J]. Advances in Computers, 2002, 54: 215-272.
[11] Chung K M, Kalai Y, Vadhan S. Improved Delegation of Computation Using Fully Homomorphic Encryption [C]//Lecture Notes in Computer Science. Berlin: Springer Verlag, 2010: 483-501.
[12] Green M, Hohenberger S, Waters B. Outsourcing the Decryption of ABE Ciphertexts[C]//Proceedings of the 20th USENIX Conference on Security. Berkeley: USENIX Association, 2011: 34.
[13] Li J, Huang X, Chen X, et al. Securely Outsourcing Attribute-based Encryption with Checkability[J]. IEEE Transactions on Parallel and Distributed Systems, 2013, 25(8): 2201-2210. |