Computer Science ›› 2026, Vol. 53 ›› Issue (3): 459-468.doi: 10.11896/jsjkx.241200102
• Information Security • Previous Articles
ZHANG Yuhang1, CHANG Jinyong1,2, YANG Luyao1, XU Maozhi3
CLC Number:
| [1]LYU Z,LOU R,LI J,et al.Big Data Analytics for 6G-enabledMassive Internet of Things[J].IEEE Internet of Things Journal,2021,8(7):5350-5359. [2]GE C,SUSILO W,LIU Z,et al.Secure Keyword Search and Data Sharing Mechanism for Cloud Computing[J].IEEE Transactions on Dependable and Secure Computing,2021,18(6):2787-2800. [3]HUANG P,FAN K,YANG H,et al.A Collaborative Auditing Blockchain for Trustworthy Data Integrity in Cloud Storage system[J].IEEE Access,2020,8:94780-94794. [4]GE C,SUSILO W,BAEK J,et al.Revocable Attribute-BasedEncryption with Data Integrity in Clouds[J].IEEE Transactions on Dependable and Secure Computing,2021,19(5):2864-2872. [5]SHEN W,YU J,YANG M,et al.Efficient Identity-Based Data Integrity Auditing with Key-Exposure Resistance for Cloud Storage[J].IEEE Transactions on Dependable and Secure Computing,2022,20(6):4593-4606. [6]LIU Z,WANG S,LIU Y.Block-Based Integrity Auditing forShared Data in Storage with File Prediction[J].Computer Networks,2023,236:110040. [7]DING R,XU Y,ZHONG H,et al.An Efficient Integrity Che-cking Scheme with Full Identity Anonymity for Cloud Data Sharing[J].IEEE Transactions on Cloud Computing,2023,11(3):2922-2935. [8]ATENIESE G,BURNS R,CURTMOLA R,et al.Provable Data Possession at Untrusted Stores[C]//Proceedings of the 14th ACM Conference on Computer and Communications Security.New York:ACM,2007:598-609. [9]JUELS A,KALISKI B S.PORs:Proofs of Retrievability forLarge Files[C]//Proceedings of the 14th ACM Conference on Computer and Communications Security.New York:ACM,2007:584-597. [10]WANG C,CHOW S,WANG Q,et al.Privacy-Preserving Public Auditing for Secure Cloud Storage[J].IEEE Transactions on Computers,2013,62(2):362-375. [11]TIAN H,GAN N,PENG F,et al.Smart Contract-Based Public Integrity Auditing for Cloud Storage Against Malicious Auditiors[J].Future Generation Computer Systems.2025,166:107709. [12]PENG W,LU T,WANG Z,et al.An Efficient Blockchain-Based Framework for File Sharing[J].Scientific Reports,2024,14:18009. [13]SHEN W,QIN J,YU J,et al.Enabling Identity-Based Integrity Auditing and Data Sharing with Sensitive Information Hiding for Secure Cloud Storage[J].IEEE Transactions on Information Forensics and Security,2018,14(2):331-345. [14]LIU Z,REN L,LI R,et al,ID-based Sanitizable Signature Data Integrity Auditing Scheme with Privacy-Preserving[J].Compu-ters & Security,2022,121:102858. [15]SINGH P,SAGAR S,SINGH S,et al.Blockchain-Enabled Verification of Medical Records Using Soul-Bound Tokens and Cloud Computing[J].Scientific Reports,2024,14:24830. [16]FENG S,DENG L,GAO Y,et al.Blockchain-Based Remote Data Integrity Auditing Scheme with Deduplication Mechanism[J].Cluster Computing-The Journal of Networks Software Tools and Applications,2025,28(1):33-47. [17]ZHANG X,SU Y,QIN J.A Dynamic Searchable Symmetric Encryption Scheme for Multiuser with Forward and Backward Security[J].Security and Communication Networks,2020,1:1-13. [18]GOYAL V,PANDEY O,SAHAI A,et al.Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data[C]//Proceedings of the 14th ACM Conference on Computer and Communications Security.New York:ACM,2006:89-98. [19]WATERS B.Ciphertext-Policy Attribute-Based Encryption:An Expressive,Efficient,and Provably Secure Eealization[C]//International Workshop on Public Key Cryptography.Berlin:Springer,2011:53-70. [20]LI H,PEI L,LIAO D,et al.FADE:A Fine-Grained Access Control Scheme for VANET Data Based on Blockchain[J].IEEE Access,2020,8:85190-85203. [21]DUAN X,LI Y,XU Y,et al.An Authentication Scheme with Attribute-Based Encryption for Power Internet of Things[C]//Proceedings of the 2024 3rd International Conference on Networks,Communications and Information Technology.New York:ACM,2024:161-165. [22]QIAO J,WANG N,FU J,et al.A Lightweight CP-ABE Scheme for EHR Over Cloud Based on Blockchain and Secure Multi-Party Computation[J].Transactions on Emerging Telecommunications Technologies,2025,36:70053. [23]XIONG H,WANG H,MENG W,et al.Attribute-Based dataSharing Scheme with Flexible Search Functionality for Cloud-Assisted Autonomous Transportation System[J].IEEE Transactions on Industrial Informatics,2023,19(11):10977-10986. [24]GUO Z,WANG G,LI Y,et al.Accountable Attribute-Based Data-Sharing Scheme Based on Blockchain for Vehicular Ad Hoc Network[J].IEEE Internet of Things Journal,2023,10(8):7011-7026. [25]SONG C,CHEN L,WU X,et al.A Secure Data Sharing Model Utilizing Attribute-Based Signcryption in Blockchain Technology[J].Sensors.2025,25:160. [26]ZHANG W X,YAN Y X,WU Y H,et al.Certificateless Sanitizable Signature Scheme in Cloud Storage[J].Computer Systems &Applications,2023,32(1):281-287. [27]KIM H,JEON Y,KIM G,et al.PIPO:A Lightweight Block Cipher with Efficient Higher-Order Masking Software Implementations[C]//Information Conference on Information Security & Cryptology.Cham:Springer,2020:99-122. |
| [1] | ZHENG Kaifa, SUN Wei, ZHOU Junxu, WU Yunkun, XU Zhen, LIU Zhiquan , HE Qiang. Weakly-decentralized Scheme for Sensitive Data Sharing with Hierarchical Access Control [J]. Computer Science, 2026, 53(2): 431-441. |
| [2] | LI Li, CHEN Jie, ZHU Jiangwen. Multi-authority Revocable Ciphertext-policy Attribute-based Encryption Data Sharing Scheme [J]. Computer Science, 2025, 52(9): 388-395. |
| [3] | YANG Ke, GUO Qinglei, SHEN Yiming, BAI Neng, SONG Wenting, WANG Weiyu. Privacy-preserving Cross-certificate System Authentication and Access Control Model for Material Supply Chain [J]. Computer Science, 2025, 52(11A): 250100131-10. |
| [4] | LIU Zhanghui, LIN Zhexu, CHEN Hanlin, MA Xinjian, CHEN Xing. Data Trusted Sharing Scheme Based on Consortium Blockchain [J]. Computer Science, 2025, 52(11): 398-407. |
| [5] | LAN Yajie, MA Ziqiang, CHEN Jiali, MIAO Li, XU Xin. Survey on Application of Searchable Attribute-based Encryption Technology Based on Blockchain [J]. Computer Science, 2024, 51(6A): 230800016-14. |
| [6] | YUE Meng, ZHU Shibo, HONG Xueting, DUAN Bingyan. Airborne Software Audit Method Based on Trusted Implicit Third Party [J]. Computer Science, 2024, 51(6A): 230400088-6. |
| [7] | LIU Wei, LIU Yuzhao, TANG Congke, WANG Yuanyuan, SHE Wei, TIAN Zhao. Study on Blockchain Based Federated Distillation Data Sharing Model [J]. Computer Science, 2024, 51(3): 39-47. |
| [8] | AN Ruicheng, WANG Huaqun. Proxy Provable Data Possession with Key-exposure Resilient [J]. Computer Science, 2024, 51(12): 310-316. |
| [9] | JIANG Luhan, TIAN Youliang, XIANG Axin. CP-ABE Scheme Supports Fully Policy and Attribute Hidden [J]. Computer Science, 2024, 51(12): 317-325. |
| [10] | ZHOU Yiteng, TANG Xin, JIN Luchao. Adaptive MSB Reversible Data Hiding Based Security Deduplication for Encrypted Images in Cloud Storage [J]. Computer Science, 2024, 51(12): 352-360. |
| [11] | YAN Li, YIN Tian, LIU Peishun, FENG Hongxin, WANG Gaozhou, ZHANG Wenbin, HU Hailin, PAN Fading. Overview of Attribute-based Searchable Encryption [J]. Computer Science, 2024, 51(11A): 231100137-12. |
| [12] | YUE Meng, WEN Cheng, HONG Xueting, YAN Simin. Airborne Software Provable Data Possession for Cloud Storage [J]. Computer Science, 2024, 51(11A): 240400040-10. |
| [13] | WANG Yi, HU Xuexian, WEI Jianghong. Two-factor Authentication Scheme for Blind Cloud Storage System Based on Password and SmartCard [J]. Computer Science, 2024, 51(1): 363-370. |
| [14] | WANG Shaohui, ZHAO Zhengyu, WANG Huaqun, XIAO Fu. Analysis and Improvement on Identity-based Remote Data Integrity Verification Scheme [J]. Computer Science, 2023, 50(7): 302-307. |
| [15] | YANG Jian, WANG Kaixuan. Tripartite Evolutionary Game Analysis of Medical Data Sharing Under Blockchain Architecture [J]. Computer Science, 2023, 50(6A): 221000080-7. |
|
||