[1] SAHAI A, WATERS B. Fuzzy Identity-based Encryption[C]//Lecture Notes in Computer Science: 3494. Heidelberg: Springer Verlag, 2005, 457-473 .
[2] CHASE M. Multi-authority Attribute Based Encryption[C]//Lecture Notes in Computer Science: 4392. Heidelberg: Springer Verlag, 2007, 515-534.
[3] LIN H , CAO Z F, LIANG X H, et al. Secure Threshold Multi-authority Attribute Based Encryption without a Central Authority[C]//Lecture Notes in Computer Science: 5365. Heidelberg: Springer-Verlag, 2008: 426-436.
[4] CHASE M, CHOW S S M. Improving Privacy and Security in Multi-authority Attribute-based Encryption[C]//Proceedings of the 2009 ACM Conference on Computer and Communication Security. New York: ACM, 2009: 121-130.
[5] LEWKO A, WATERS B. Decentralizing Attribute-based Encryption[C]//Lecture Notes in Computer Science: 6632. Heidelberg: Springer Verlag, 2011: 568-588.
[6] XHAFA F, FENG J L, ZHANG Y H, et al. Privacy-aware Attribute-based PHR Sharing with User Accountability in Cloud Computing[J]. Journal of Supercomputing, 2015, 71(5): 1607-1619.
[7] HAN J G, SUSILO W, MU Y, et al. Improving Privacy and Security in Decentralized Ciphertext-policy Attribute-based Encryption[J]. IEEE Transactions on Information Forensics and Security, 2015, 10(3): 665-678.
[8] WANG M Q, ZHANG Z F, CHEN C. Security Analysis of a Privacy-preserving Decentralized Ciphertext-policy Attribute-based Encryption Scheme[J]. Concurrency Computation, 2016, 28(4): 1237-1245.
[9] SAHAI A, SEYALIOGLU H, WATERS B. Dynamic Credentials and Ciphertext Delegation for Attribute-based Encryption[C]//Lecture Notes in Computer Science: 7417. Heidelberg: Springer Verlag, 2012: 199-217.
[10] YANG K, JIA X H, REN K. Secure and Verifiable Policy Update Outsourcing for Big Data Access Control in the Cloud[J]. IEEE Transactions on Parallel and Distributed Systems, 2015, 26(12): 3461-3470.
[11] 应作斌, 马建峰, 崔江涛. 支持动态策略更新的半策略隐藏属性加密方案[J]. 通信学报, 2015, 36(12): 178-189.
YING Zuobin, MA Jianfeng, CUI Jiangtao. Partially Policy Hidden CP-ABE Supporting Dynamic Policy Updating[J]. Journal on Communications, 2015, 36(12): 178-189.
[12] LI H W, LIU D X, ALHARBI K, et al. Enabling Fine-grained Access Control with Efficient Attribute Revocation and Policy Updating in Smart Grid[J]. KSII Transactions on Internet and Information Systems, 2015, 9(4): 1404-1423.
[13] QIAN H L, LI J G, ZHANG Y C, et al. Privacy-preserving Personal Health Record Using Multi-authority Attribute-based Encryption with Revocation[J]. International Journal of Information Security, 2014, 14(6): 487-497.
[14] 应作斌, 马建峰, 崔江涛. 支持位置验证和策略变更的属性加密方案[J]. 西安电子科技大学学报, 2017, 44(2): 57-62.
YING Zuobin, MA Jianfeng, CUI Jiangtao. Attribute-based Encryption with Location Verification and Policy Adjusting Supporting the Cloud Mobile Office[J]. Journal of Xidian University, 2017, 44(2): 57-62.
[15] YING Z B, LI H, MA J F, et al. Adaptively Secure Ciphertext-policy Attribute-based Encryption with Dynamic Policy Updating[J]. Science China Information Sciences, 2016, 59(4): 042701.
[16] LAI J Z, DENG R H, LI Y J. Expressive CP-ABE with Partially Hidden Access Structures[C]//Proceedings of the 2012 7th ACM Symposium on Information, Computer and Communications Security. New York: ACM, 2012: 18-19 . |