[1]
Sahai A, Waters B. Fuzzy identitybased encryption[C]// EUROCRYPT. 2005,3494:457-473.
[2]Bethencourt J, Sahai A, Waters B. CiphertextPolicy attributebased encryption[C]// Proc. IEEE Symposium on Security and Privacy. 2007:321-334.
[3]Goyal V, Pandey O, Sahai A, et al. Attributebased encryption for finegrained access control of encrypted data[C]// Proc. 13th ACM Conference on Computer and Communications Security. 2006:89-98.
〖LL〗[4]Yu Shucheng, Wang Cong, Ren Kui, et al. Attribute based data sharing with attribute revocation[C]// Proc. 5th ACM Symposium on Information, Computer and Communications Security. 2010:261-270.
[5]Tysowski P K, Hasan M A. Hybrid attributebased encryption and reencryption for scalable mobile applications in clouds[J]. IEEE Transactions on Cloud Computing, 2013,1(2):172-186.
[6]Hur J, Noh D K. Attributebased access control with efficient revocation in data outsourcing systems[J]. IEEE Transactions on Parallel and Distributed Systems, 2011,22(7):1214-1221.
[7]Hur J. Improving securityand efficiency in attribute based data sharing[J]. IEEE Transactions on Knowledge and Data Engineering, 2013,25(10):22712282.
[8]苏金树,曹丹,王小峰,等,属性基加密机制[J]. 软件学报, 2011,22(6):1299-1315.
[9]Yang Kan, Jia Xiaohua, Ren Kui. Attributebased finegrained access control with efficient revocation in cloud storage systems[C]// ASIA CCS ’13. 2013:523-528.
[10]王鹏翩,冯登国,张立武. 一种支持完全细粒度属性基撤销的CPABE方案[J]. 软件学报, 2012,23(10):2805-2816.
[11]Xie Xingxing, Ma Hua, Li Jin, et al. New ciphertextpolicy attributebased access control with efficient revocation[C]// ICTEur Asia. 2013,7804:373-382.
[12]Boldyreva A, Goyal V, Kumar V. Identitybased encryption with efficient revocation[C]// ACM CCS. 2008:417426.
[13]Yang Ming, Liu Fan, Han Jingli, et al. An efficient attribute based encryption scheme with revocation for outsourced data sharing control[C]// International Conference on Instrumentation, Measurement, Computer, Communication and Control. 2011:516-520.
[14]Chen Jianwei, Ma Huadong. Efficient decentralized attributebased access control for cloud storage with user revocation[C]// IEEE ICC. 2014:3782-3787.
[15]Green M, Hohenberger S, Waters B. Outsourcing the decryption of ABE ciphertexts[C]// Proceedings of the USENIX Security Symposium. 2011.
[16]Li Jin, Chen Xiaofeng, Li Jingwei, et al. Finegrained access control system based on outsourced attributebased encryption[C]// ESORICS. 2013,8134:592-609.
[17]Li Jingwei, Jia Chunfu, Li Jin. et al. Outsourcing encryption of attributebased encryption with map reduce[C]// ICICS. 2012,7618:191-201.
[18]Chase M. Multiauthority attribute based encryption[C]// TCC. 2007,4392:515-534.
|