Computer Science ›› 2020, Vol. 47 ›› Issue (4): 292-297.doi: 10.11896/jsjkx.190300144
• Information Security • Previous Articles Next Articles
SHI Yu-qing, LING Jie
CLC Number:
[1]SAHAI A,WATERS B.Fuzzy identity-based encryption[M]//Advances in Cryptology-EUROCRYPT2005.Springer-Verlag,2005:457-473. [2]GOYAL V,PANDEY O,SAHAI A,et al.Attribute-based encryption for fine-grained access control of encrypted data[C]//Proceedings of the 13th ACM Conference on Computer and Communications Security.New York:ACM,2006:89-98. [3]OSTROVSKY R,SAHAI A,WATERS B.Attribute-based encryption with non-monotonic access structures[C]//Procee-dings of the 14th ACM Conference on Computer and Communications Security.New York:ACM,2007:195-203. [4]GOYAL V,JAIN A,PANDEY O,et al.Bounded CiphertextPolicy Attribute Based Encryption [M]//Proceedings of the 35th International Colloquium on Automata,Languages and Programming.Springer-Verlag,2008:579-591. [5]BETHENCOURT J,SAHAI A,WATERS B.Ciphertext-policy attribute-based encryption[C]//Proceedings of the 2007 IEEE Symposium on Security and Privacy.IEEE,2007:321-334. [6]WATERS B.Ciphertext-policy attribute-based encryption:anexpressive,efficient,and provably secure realization[M]//Proceedings of PublicKey Cryptography-PKC 2011.Springer-Verlag,2011:53-70. [7]LEWKO A,OKAMOTO T,SAHAI A,et al.Fully secure functional encryption:attribute-based encryption and (hierarchical) inner product encryption[M]//Advances in Cryptology-EUROCRYPT 2010.Springer-Verlag,2010:62-91. [8]OKAMOTO T,TAKASHIMA K.Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption[M]//Advances in Cryptology-CRYPTO 2010.Sprin-ger-Verlag,2010:191-208. [9]LEWKO A,WATERS B.New proof methods for attributebased encryption:Achieving full security through selective techniques[M]//Advances in Cryptology-CRYPTO 2012.Springer-Verlag,2012:180-198. [10]HERRANZ J,LAGUILLAUMIE F,RAFOLS C.Constant Size Ciphertexts in Threshold Attribute-Based Encryption[M]//Proceedings of PublicKey Cryptography-PKC 2010.Springer-Verlag,2010:19-34. [11]GREEN M,HOHENBERGER S,WATERS B.Outsourcing the Decryption of ABE Ciphertexts[C]//Proceedings of the 20th USENIX Conference on Security.USENIX Association,2011:523-538. [12]HOHENBERGER S,WATERS B.Online/Offline AttributeBased Encryption[M]//PublicKey Cryptography-PKC 2014.Springer-Verlag,2014:293-310. [13]LEWKO A,WATERS B.Unbounded HIBE and AttributeBased Encryption[M]//Advances in Cryptology-EUROCRYP-T2005.Springer-verlag,2011:547-567. [14]ROUSELAKIS Y,WATERS B.Practical constructions and new proof methods for large universe attribute-based encryption[C]//Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security.New York:ACM,2013:463-474. [15]HINEK M J,JIANG S,SAFAVI-NAINI R,et al.Attributebased encryption with key cloning protection[EB/OL].(2008-11-12) [2019-03-13].https://eprint.iacr.org/2008/478. [16]LI J,REN K,KIM K.A2BE:Accountable attribute-based encryption for abuse free access control[EB/OL].(2009-04-14) [2019-03-13].https://eprint.iacr.org/2009/118. [17]LIU Z,CAO Z,WONG D S.White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Any Monotone Access Structures[J].IEEE Transactions on Information Forensics and Security,2013,8(1):76-88. [18]NING J,DONG X,CAO Z,et al.White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Flexible Attributes[J].IEEE Transactions on Information Forensics and Security,2015,10(6):1274-1288. [19]ZHANG X,JIN C,LI C,et al.Ciphertext-Policy Attribute-Based Encryption with User and Authority Accountability[C]//International Conference on Security and Privacy in Communication Networks.Springer,2015:500-518. [20]NING J,DONG X,CAO Z,et al.Accountable Authority Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability and Public Auditing in the Cloud[M]//EuropeanSympo-siumon Research in Computer Security-ESORICS 2015.Sprin-ger,2015:270-289. [21]MA X,YU G.Publicly Accountable Ciphertext-policy Attribute-based Encryption Scheme[J].Computer Science,2017,44(5):160-165. [22]ZHANG K,MA J,ZHANG J,et al.Online/Offline Traceable Attribute-Based Encryption [J].Computer Research andDeve-lopment,2018,55(1):216-224. [23]BEIMEL A.Secure schemes for secret sharing and key distribution[D].Haifa,Israel:Technion-Israel Institute of Technology,1996. [24]BONEH D,FRANKLIN M.Identity-Based Encryption from the Weil Pairing[M]//Advances in Cryptology-CRYPTO 2001.Springer-Verlag,2001:213-229. [25]BONEH D,BOYEN X.Short Signatures Without Random Oracles[M]//Advances in Cryptology-EUROCRYPT 2004.Sprin-ger-Verlag,2004:56-73. [26]GOYAL V.Reducing trust in the PKG in identity based cryptosystems[M]//Advances in Cryptology-CRYPTO 2007.Sprin-ger-Verlag,2007:430-447. [27]GOYAL V,LU S,SAHAI A,et al.Black Box Accountable Authority Identity-Based Encryption[C]//Proceedings of the 2008 ACM Conference on Computer and Communications Security.New York:ACM,2008:427-436. |
[1] | HE Heng, JIANG Jun-jun, FENG Ke, LI Peng, XU Fang-fang. Efficient Multi-keyword Retrieval Scheme Based on Attribute Encryption in Multi-cloud Environment [J]. Computer Science, 2021, 48(11A): 576-584. |
[2] | MA Xiao-xiao and HUANG Yan. Publicly Traceable Accountable Ciphertext Policy Attribute Based Encryption Scheme Supporting Large Universe [J]. Computer Science, 2020, 47(6A): 420-423. |
[3] | LIU Sheng-jie, WANG Jing. Privacy Preserving Scheme for SNS in Cloud Environment [J]. Computer Science, 2019, 46(2): 133-138. |
[4] | CHU Xiao-lu, LIU Pei-shun. Multi-authority Encryption Scheme Based on Public and Private Attributes [J]. Computer Science, 2018, 45(11): 124-129. |
[5] | YAN Ming, ZHANG Ying-hui, ZHENG Dong, LV Liu-di, SU Hao-nan. Flexibly Accessed and Vaguely Searchable EHR Cloud Service System [J]. Computer Science, 2018, 45(10): 172-177. |
[6] | WENG An-xiang and LING Jie. Improved Scheme of CP-ABE with Hidden Access Structure [J]. Computer Science, 2017, 44(Z11): 377-380. |
[7] | MA Xiao-xiao and YU Gang. Publicly Accountable Ciphertext-policy Attribute-based Encryption Scheme [J]. Computer Science, 2017, 44(5): 160-165. |
[8] | SONG Wen-na, XIANG Guang-li, LI An-kang, ZHANG Yue-xin and TAO Ran. Improved Attribute-based Encryption Scheme [J]. Computer Science, 2017, 44(1): 167-171. |
[9] | DING Xiao-hong, QIN Jing-yuan and WANG Xin. Attribute-based Encryption Scheme with Outsourcing Decryption Method [J]. Computer Science, 2016, 43(Z6): 357-360. |
[10] | YIN Kai-ze and WANG Hai-hang. Research on Access Control Model in Multi-clouds Storage System Based on CP-ABE [J]. Computer Science, 2016, 43(9): 165-168. |
[11] | HUANG Bao-hua, JIA Feng-wei and WANG Tian-jing. Database Access Control Policy Based on Attribute in Cloud Storage Platform [J]. Computer Science, 2016, 43(3): 167-173. |
[12] | LIU Xiao-jian, WANG Li-sheng and LIAO Xin-kao. Multiple Permissions Secure Access Control Scheme Combining CP-ABE and XACML in Cloud Storage [J]. Computer Science, 2016, 43(3): 118-121. |
[13] | WANG Hai-ping and ZHAO Jing-jing. Ciphertext-policy Attribute-based Encryption with Anonymous Access Structure [J]. Computer Science, 2016, 43(2): 175-178. |
[14] | JIANG Di and HAN Yi-liang. Attribute-based Online/Offline Signcryption for Mobile Network [J]. Computer Science, 2016, 43(11): 221-225. |
[15] | LI Zuo-hui and CHEN Xing-yuan. ABE Scheme with Generalized Wildcards on Prime Order Groups [J]. Computer Science, 2016, 43(1): 186-190. |
|