[1]MellP,GranceT.TheNISTDefinitionofCloudComputing[R].NISTNationalInstituteofStandardsandTechnologyU.SDeportmentofCommerce,SpecialPubllication800-145,2011.
[2]SahaiA,WatersB.Fuzzyidentity-basedencryption[C]//Proceedingsofthe24thAnnualInternationalConferenceonTheoryandApplicationsofCryptographicTechniques.2005:457-473.
[3]GoyalV,PandeyO,SahaiA,etal.Attribute-basedencryptionforfine-grainedaccesscontrolofencrypteddata[C]//Proceedingsofthe13thACMConferenceonComputerandCommunicationsSecurity.2006:89-98.
[4]BethencourtJ,SahaiA,WatersB.Ciphertext-policyattribute-basedencryption[C]//Proceedingsof2007IEEESymposiumonSecurityandPrivacy.2007:321-334.
[5]CheungL,NewportC.ProvablysecureciphertextpolicyABE[C]//Proceedingsofthe14thACMConferenceonComputerandCommunicationsSecurity.2007:456-465.
[6]PirrettiM,TraynorP,McDanielP,etal.Secureattribute-basedsystems[C]//Proceedingsofthe13thACMConferenceonComputerandCommunicationsSecurity.2006:99-112.
[7]BoldyrevaA,GoyalV,KumarV.Identity-basedencryptionwithefficientrevocation[C]//Proceedingsofthe15thACMConferenceonComputerandCommunicationsSecurity.2008:417-426.
[8]DoJeong-min,SongYou-jin,ParkN.Attributebasedproxyre-encryptionfordataconfidentialityincloudcomputingenvironments[C]//Proceedingsof20111stACIS/JNUInternationalConferenceonComputers,Networks,SystemsandIndustrialEngineering.2011:248-251.
[9]AttrapadungN,ImaiH.Conjunctivebroadcastandattribute-basedencryption[C]//Proceedingsofthe3rdInternationalConferencePaloAltoonPairing-BasedCryptography.2009:248-265.
[10]TysowskiPK,HasanMA.Hybridattribute-andre-encryption-basedkeymanagementforsecureandscalablemobileapplicationsinclouds[J].IEEETransactionsonCloudComputing,2013,1(2):172-186.
[11]YuShucheng,WangCong,RenKui,etal.Attributebaseddatasharingwithattributerevocation[C]//Proceedingsofthe5thACMSymposiumonInformation,ComputerandCommunicationsSecurity.2010:261-270.
[12]BonehD,FranklinM.Identity-basedencryptionfromtheweilpairing[C]//Proceedingsofthe21stAnnualInternationalCryptologyConferenceonAdvancesinCryptology.2001:213-229.
[13]BeimelA.SecureSchemesforSecretSharingandKeyDistribution[D].Haifa:IsraelInstituteofTechnology,1996.
[14]GoldreichO,GoldwasserS,MicaliS.Howtoconstructrandomfunctions[J].JournaloftheACM,1986,33(4):792-807.
[15]MenezesAJ,vanOorschotPC,VanstoneSA.HandbookofAppliedCryptography[M].CRCPress,1997.
[16]RosenKH.离散数学及其应用[M].袁崇义,屈婉玲,张桂芸,等译.北京:机械工业出版社,2007.
[17]KiayiasA,PapadopoulosS,TriandopoulosN,etal.Delegatablepseudorandomfunctionsandapplications[C]//Proceedingsof2013ACMSIGSACConferenceonComputer&CommunicationsSecurity.2013:669-684.
|