[1] RAHIMI M, REN J, RAHAYU W.Mobile cloud computing: A survey, state of art and future directions[J]. Mobile Networks and Applications, 2014,19(2):133-143.
[2] YU S C, WANG C, REN K, et al. Achieving secure, scalable, and fine-grained data access control in cloud computing[C]// Proceedings of the 29th Conference on Information communications. 2010:534-542.
[3] LI M, YU S C, ZHENG Y, et al. Scalable and secure sharing of personal health records in computing using attribute-based encryption[J]. IEEE TPDS, 2013,24(1):131-143.
[4] SAHAI A, WATERS B. Fuzzy identity-based encryption[C]// Proceedings of the 24th Annual International Conference on Theory and Applications of Cryptographic Techniques. 2005:457-473.
[5] BETHENCOURT J, SAHAI A, WATERS B. Ciphertext policy attribute-based encryption[C]// IEEE Symposium on Security And Privacy. 2007:321-334.
[6] GOYAL V, JAIN A, PANDEY O, et al. Bounded ciphertext policy attribute based encryption[C]// Proceeding of the 35th International Colloquium on Automata. 2008:579-591.
[7] GOYAL V, PANDEY O, SAHAI A, et al. Attribute-based encryption for fine-grained access control of encrypted data[C]// Proceedings of the 13th ACM Conference on Computer And Communications Security. 2006:89-98.
[8] 张玉磊,刘文静,马彦丽,等. 多属性授权机构环境下属性可撤销的CP-ABE方案[J]. 计算机工程, 2018,44(8):19-23.
[9] PIRRETTI M, TRAYNOR P, MCDANIEL P, et al. Secure attribute-based systems[C]// Proceedings of the ACM Conference on Computer and Communications Security. 2006:99-112.
[10]BOLDYREVA A, GOYAL V, KUMAR V. Identity-based encryption with efficient revocation[C]// Proceedings of the 15th ACM Conference on Computer and Communications Security. 2008:417-426.
[11]IBRAIMI L, PETKOVIC M, NIKOVA S, et al. Mediated ciphertext-policy attribute- based encryption and its application[C]// Proceedings of the 10th International Workshop on Information Security Applications. 2009:309-323.
[12]OSTROVSKY R, SAHAI A, WATERS B. Attribute-based encryption with non-monotonic access structures[C]// Proceedings of the ACM Conference on Computer and Communications Security. 2007:195-203.
[13]ATTRAPADUNG N, IMAI H. Conjunctive broadcast and attribute-based encryption[C]// Proceedings of the Pairing-based Cryptography. 2009:248-265.
[14]KANGAVALLI R, VAGDEVI S. A mixed homomorphic encryption scheme for secure data storage in cloud[C]// 2015 IEEE International Advance Computing Conference(IACC). 2015:1062-1066.
[15]CHEN G L, XU Z Q, JIANG H, et al. Generic user revocation systems for attribute-based encryption in cloud storage[J]. Frontiers of Information Technology and Electronic Engineering, 2018,19(11):1362-1384.
[16]XU S M, YANG G M, MU Y. Revocable attribute-based encryption with decryption key exposure resistance and ciphertext delegation[J]. Information Sciences, 2019,479:116-134.
[17]WANG S P, ZHANG D, ZHANG Y L, et al. Efficiently revocable and searchable attribute-based encryption scheme for mobile cloud storage[J]. IEEE Access, 2018,6:30444-30457.
[18]WANG H, HE D B, SHEN J, et al. Fuzzy matching and direct revocation: A new CP-ABE scheme from multilinear maps[J]. Soft Computing, 2018,22(7):2267-2274. |