Computer Science ›› 2018, Vol. 45 ›› Issue (11): 124-129.doi: 10.11896/j.issn.1002-137X.2018.11.018
• Information Security • Previous Articles Next Articles
CHU Xiao-lu, LIU Pei-shun
CLC Number:
[1]SAHAI A,WATERS B.Fuzzy identity-based encryption∥International Conference on Theory and Applications of Cryptographic Techniques.Springer-Verlag,2005:457-473. [2]GOYAL V,PANDEY O,SAHAI A,et al.Attribute-Based Encryption for Fine-Grained Access Control of Encryption Data[C]∥ACM Conference on Computer and Communication Security (CCS 2006).New York:ACM Press,2006:89-98. [3]BETHENCOURTJ,SAHAI A,WATERS B.Ciphertext-policy attribute-based encryption[C]∥2017 IEEE Symposium on Security and Privacy.Berkeley:IEEE Press,2018(4):321-334. [4]CHASE M.Multi-authority attribute based encryption[C]∥ Theory of Cryptography.Berlin,Heidelberg:Springer Press,2007:515-534. [5]GOYAL V,JIAN A,PANDEY O,et al.Bounded ciphertext po- licy attribute based encryption[C]∥International Colloquium on Automata,Languages,and Programming.Berlin,Heidelberg:Springer Press,2008:579-591. [6]WATER B.Ciphertext-policy attribute-based encryption:An expressive,efficient,and provably secure realization[C]∥International Workshop on Public Key Cryptography.Taormina:Springer,2011:53-70. [7]HINEK M J.Attribute-Based Encryption with Key Cloning Pro- tection.Cryptology Eprint Archive Report,2006,2008(4):803-819. [8]RUJ S,NAYAK A,STOJMENOVIC I.DACC:Distributed Access.Control in Clouds[C]∥2011 IEEE 10th International Conference on Trust,Security and Privacy in Computing and Communications.Changsha:IEEE Press,2011:91-98. [9]CHEN J,LIM H W,LING S,et al.Shorter IBE and signatures via asymmetric pairings [C]∥International Conference on Pairing-Based Cryptography.Cologne:Springer Press,2012:122-140. [10]LEWKO A B,WATERS B.New proof methods for attribute-based encryption:Achieving full security through selective techniques [C]∥Advances in Cryptology-CRYPTO.Santa Barbara:Springer Press,2012:180-198. [11]CHASE M.Multi-authority attribute-based encryption[C]∥The Fourth Theory of Cryptography Conference (TCC 2007).Berlin,Heidelberg:Springer Press,2007:515-534. [12]CAOZ F.New directions of modern cryptography [M].Boca Raton:CRC Press,2012. [13]LEWKO A B,Waters B.Decentralizing attribute-based encryption [C]∥Annual International Conference on the Theory and Applications of Cryptographic Techniques.Tallinn:Springer,2011:568-588. [14]TANG Q,JI D Y.Multi-authority verifiable attribute based encryption[J].Journal of Wuhan University(Science Edition),2008,54(5):607-610.(in Chinese) 唐强,姬东耀.多授权中心可验证的基于属性的加密方案[J].武汉大学学报(理学版),2008,54(5):607-610. [15]LEWKO A,WATERS B.Decentralizing attribute-based encryption[C]∥Advances in Cryptology-EUROCRYPT.2011:568-588. [16]YANG K,JIA X H.Attributed-based Access Control for Multi-authority System in Cloud Storage[C]∥2012 IEEE 32nd International Conference on Distributed Computing Systems.Macau:IEEE Press,2012:536-545. [17]YANG K,JIA X H.Expressive,Efficient and Revocable Data Access Control for Multi-Authority Cloud Storage[C]∥IEEE Transactions on Parallel and Distributed Systems.IEEE Computer Society:IEEE Press,2013:1735-1744. [18]ROUSELAKIS Y,WATERS B.Efficient statically-secure largeu- niverse multi-authority attribute-based encryption [C]∥International Conference on Financial Cryptography and Data Security.Berlin,Heidelberg:Springer Press,2015:315-332. [19]YANG X D,YANG M M,YANG P,et al.A Multi-authority Attribute-Based Encryption Access Control for Social Network[C]∥2017 3rd IEEE International Conference on Control Scien-ce and Systems Engineering (ICCSSE).Beijing:IEEE Press,2017:671-674. [20]FENG D G,CHEN C.Research on Attribute-based Cryptography[J].Journal of Cryptologic Research,2014,1(1):1-12.(in Chinese) 冯登国,陈成.属性密码学研究[J].密码学报,2014,1(1):1-12. [21]CAO Z F.New Development of Cryptography[J].Journal of Sichuan University,2015,1(47):1-12.(in Chinese) 曹珍富.密码学的新发展[J].四川大学学报,2015,1(47):1-12. [22]CHEND W,WANL Q,WANG C,et al.A Multi-authority Attribute-based Encryption Scheme with Pre-decryption[C]∥2015 Seventh International Symposium on Parallel Architectures,Algorithms and Programming(PAAP).Nanjing:IEEE Press,2015:223-228. [23]HU P,GAO H Y.Key-Policy Attribute-Based Encryption Sc- heme for General Circuits[J].Journal of Software,2016,27(6):1498-1510.(in Chinese) 胡鹏,高海英.一种实现一般电路的密钥策略的属性加密方案[J].软件学报,2016,27(6):1498-1510. [24]BEIMEL A.Secure schemes for secret sharing and key distribution.Phd Thesis Israel Institute of Technology Technion,1996.http://www.dphu.org/uploads/attachements/books/books_1542_0.pdf. [25]LIU Z,CAO Z F,WONG D S.White-box traceable ciphertext-policy attribute-based encryption supporting any monotone access structures[C]∥IEEE Transaction on Information Forensics and Security.IEEE Signal Processing Society:IEEE Press,2013:76-88. |
[1] | GAO Shi-yao, CHEN Yan-li, XU Yu-lan. Expressive Attribute-based Searchable Encryption Scheme in Cloud Computing [J]. Computer Science, 2022, 49(3): 313-321. |
[2] | WANG Zheng, JIANG Chun-mao. Cloud Task Scheduling Algorithm Based on Three-way Decisions [J]. Computer Science, 2021, 48(6A): 420-426. |
[3] | PAN Rui-jie, WANG Gao-cai, HUANG Heng-yi. Attribute Access Control Based on Dynamic User Trust in Cloud Computing [J]. Computer Science, 2021, 48(5): 313-319. |
[4] | CHEN Yu-ping, LIU Bo, LIN Wei-wei, CHENG Hui-wen. Survey of Cloud-edge Collaboration [J]. Computer Science, 2021, 48(3): 259-268. |
[5] | JIANG Hui-min, JIANG Zhe-yuan. Reference Model and Development Methodology for Enterprise Cloud Service Architecture [J]. Computer Science, 2021, 48(2): 13-22. |
[6] | WANG Wen-juan, DU Xue-hui, REN Zhi-yu, SHAN Di-bin. Reconstruction of Cloud Platform Attack Scenario Based on Causal Knowledge and Temporal- Spatial Correlation [J]. Computer Science, 2021, 48(2): 317-323. |
[7] | HE Heng, JIANG Jun-jun, FENG Ke, LI Peng, XU Fang-fang. Efficient Multi-keyword Retrieval Scheme Based on Attribute Encryption in Multi-cloud Environment [J]. Computer Science, 2021, 48(11A): 576-584. |
[8] | MAO Han-yu, NIE Tie-zheng, SHEN De-rong, YU Ge, XU Shi-cheng, HE Guang-yu. Survey on Key Techniques and Development of Blockchain as a Service Platform [J]. Computer Science, 2021, 48(11): 4-11. |
[9] | WANG Qin, WEI Li-fei, LIU Ji-hai, ZHANG Lei. Private Set Intersection Protocols Among Multi-party with Cloud Server Aided [J]. Computer Science, 2021, 48(10): 301-307. |
[10] | LEI Yang, JIANG Ying. Anomaly Judgment of Directly Associated Nodes Under Cloud Computing Environment [J]. Computer Science, 2021, 48(1): 295-300. |
[11] | XU Yun-qi, HUANG He, JIN Zhong. Application Research on Container Technology in Scientific Computing [J]. Computer Science, 2021, 48(1): 319-325. |
[12] | ZHNAG Kai-qi, TU Zhi-ying, CHU Dian-hui, LI Chun-shan. Survey on Service Resource Availability Forecast Based on Queuing Theory [J]. Computer Science, 2021, 48(1): 26-33. |
[13] | LI Yan, SHEN De-rong, NIE Tie-zheng, KOU Yue. Multi-keyword Semantic Search Scheme for Encrypted Cloud Data [J]. Computer Science, 2020, 47(9): 318-323. |
[14] | MA Xiao-xiao and HUANG Yan. Publicly Traceable Accountable Ciphertext Policy Attribute Based Encryption Scheme Supporting Large Universe [J]. Computer Science, 2020, 47(6A): 420-423. |
[15] | LIANG Jun-bin, ZHANG Min, JIANG Chan. Research Progress of Social Sensor Cloud Security [J]. Computer Science, 2020, 47(6): 276-283. |
|