Computer Science ›› 2025, Vol. 52 ›› Issue (9): 388-395.doi: 10.11896/jsjkx.240700066
• Information Security • Previous Articles Next Articles
LI Li1, CHEN Jie2, ZHU Jiangwen3
CLC Number:
[1]SAHAI A,WATERS B.Fuzzy identity-based encryption[C]//Annual International Conference on the Theory and Applications of Cryptographic Techniques.Berlin:Springer,2005:457-473. [2]BETHENCOURT J,SAHAI A,WATERS B.Ciphertext-policy attribute-based encryption[C]//2007 IEEE Symposium on Security and Privacy(SP’07).IEEE,2007:321-334. [3]GOYAL V,PANDEY O,SAHAI A,et al.Attribute-based encryption for fine-grained access control of encrypted data[C]//Proceedings of the 13th ACM Conference on Computer and Communications Security.2006:89-98. [4]YAN X,NI H,LIU Y,et al.Privacy-preserving multi-authority attribute-based encryption with dynamic policy updating in PHR[J].Computer Science and Information Systems,2019,16(3):831-847. [5]ATTRAPADUNG N,IMAI H.Conjunctive broadcast and attribute-based encryption[C]//International Conference on Pairing-based Cryptography.Berlin:Springer,2009:248-265. [6]WANG P P,FENG D G,ZHANG L W.CP-ABE Scheme Supporting Fully Fine-Grained Attribute Revocation[J].Journal of Software,2012,23(10):2805-2816. [7]DAS S,NAMASUDRA S.MACPABE:Multi-Authority-basedCP-ABE with efficient attribute revocation for IoT-enabled healthcare infrastructure[J].International Journal of Network Management,2023,33(3):e2200. [8]LIU J K,YUEN T H,ZHANG P,et al.Time-Based Direct Re-vocable Ciphertext-Policy Attribute-Based Encryption with Short Revocation List[C]//Applied Cryptography and Network Security.Cham:Springer,2018:516-534. [9]LIU Y L,XU S W,YUE Z Y.A Lightweight CP-ABE Schemewith Direct Attribute Revocation for Vehicular Ad Hoc Network[J].Entropy,2023,25(7):979. [10]JIANG Y,SUSILO W,MU Y,et al.Ciphertext-policy attribute-based encryption with hidden access policy[J].Mobile Networks and Applications,2018,23(4):840-854. [11]WEI J H,CHEN X F,HUANG X X,et al.RS-HABE:Revocable-Storage and Hierarchical Attribute-Based Access Scheme for Secure Sharing of e-Health Records in Public Cloud[J].IEEE Transactions on Dependable and Secure Computing,2019,18(5):2301-2315. [12]GUO L F,XING X M,GUO H.An efficient traceable and revocable attribute-based encryption scheme in cloud storage[J].Journal of Cryptologic Research,2023,10(1):131-145. [13]ZHOU X B,JIANG R.A fine-grained data encryption and sharing scheme in fog and cloud computing environments[J].Journal of Cryptologic Research,2023,10(6):1295-1318. |
[1] | REN Jiadong, LI Shangyang, REN Rong, ZHANG Bing, WANG Qian. Web Access Control Vulnerability Detection Approach Based on Site Maps [J]. Computer Science, 2024, 51(9): 416-424. |
[2] | LAN Yajie, MA Ziqiang, CHEN Jiali, MIAO Li, XU Xin. Survey on Application of Searchable Attribute-based Encryption Technology Based on Blockchain [J]. Computer Science, 2024, 51(6A): 230800016-14. |
[3] | TIAN Hongliang, XIAN Mingjie, GE Ping. Fine Grained Security Access Control Mechanism Based on Blockchain [J]. Computer Science, 2024, 51(6A): 230400080-7. |
[4] | LIU Wei, LIU Yuzhao, TANG Congke, WANG Yuanyuan, SHE Wei, TIAN Zhao. Study on Blockchain Based Federated Distillation Data Sharing Model [J]. Computer Science, 2024, 51(3): 39-47. |
[5] | JIANG Luhan, TIAN Youliang, XIANG Axin. CP-ABE Scheme Supports Fully Policy and Attribute Hidden [J]. Computer Science, 2024, 51(12): 317-325. |
[6] | YAN Li, YIN Tian, LIU Peishun, FENG Hongxin, WANG Gaozhou, ZHANG Wenbin, HU Hailin, PAN Fading. Overview of Attribute-based Searchable Encryption [J]. Computer Science, 2024, 51(11A): 231100137-12. |
[7] | MEN Ruirui, JIA Hongyong, DU Jinru. Study on Stream Data Authorization Revocation Scheme Based on Smart Contracts [J]. Computer Science, 2024, 51(10): 372-379. |
[8] | TONG Fei, SHAO Ranran. Study on Blockchain Based Access Control Model for Cloud Data [J]. Computer Science, 2023, 50(9): 16-25. |
[9] | YANG Jian, WANG Kaixuan. Tripartite Evolutionary Game Analysis of Medical Data Sharing Under Blockchain Architecture [J]. Computer Science, 2023, 50(6A): 221000080-7. |
[10] | ZHANG Shue, TIAN Chengwei, LI Baogang. Review of Identity Authentication Research Based on Blockchain Technology [J]. Computer Science, 2023, 50(5): 329-347. |
[11] | FAN Shuhuan, HOU Mengshu. Dataspace:A New Data Organization and Management Model [J]. Computer Science, 2023, 50(5): 115-127. |
[12] | MA Qican, WU Zehui, WANG Yunchao, WANG Xinlei. Approach of Web Application Access Control Vulnerability Detection Based on State Deviation Analysis [J]. Computer Science, 2023, 50(2): 346-352. |
[13] | GUO Peng-jun, ZHANG Jing-zhou, YANG Yuan-fan, YANG Shen-xiang. Study on Wireless Communication Network Architecture and Access Control Algorithm in Aircraft [J]. Computer Science, 2022, 49(9): 268-274. |
[14] | YANG Zhen, HUANG Song, ZHENG Chang-you. Study on Crowdsourced Testing Intellectual Property Protection Technology Based on Blockchain and Improved CP-ABE [J]. Computer Science, 2022, 49(5): 325-332. |
[15] | GAO Shi-yao, CHEN Yan-li, XU Yu-lan. Expressive Attribute-based Searchable Encryption Scheme in Cloud Computing [J]. Computer Science, 2022, 49(3): 313-321. |
|