Page 269 - 《软件学报》2020年第12期
P. 269

罗王平  等:一种支持快速加密的基于属性加密方案                                                         3935


         References:
          [1]    Ghemawat S, Gobioff H, Leung ST. The Google file system. In: Juels A, Wright RN, Vimercati SDC, eds. Proc. of the 19th ACM
             Symp. on Operating Systems Principles. Alexandria: ACM, 2003. 29−43. [doi: 10.1145/945445.945450]
          [2]    Sahai A, Waters B. Fuzzy identity based encryption. In: Proc. of the Advances in Cryptology, Eurocrypt. LNCS: Springer-Verlag,
             2005. 457−473. [doi: 10.1007/11426639_27]
          [3]    Lee CC, Chung PS, Hwang MS. A survey on attribute-based encryption schemes of access control in cloud environments. Int’l
             Journal of Network Security, 2013,15(4):231−240.
          [4]    Qiao Z,  Liang SW,  Davis S, Jiang H. Survey of  attribute based  encryption. In: Proc. IEEE/ACIS Int’l  Conf. on Software
             Engineering,  Artificial Intelligence,  Networking  and Parallel/Distributed  Computing. Austria: IEEE, 2014. 1−6. [doi: 10.1109/
             SNPD.2014.6888687]
          [5]    Feng CS, Qin ZG, Yuan D. Techniques of secure storage for cloud data. Chinese Journal of Computers, 2015,38(1):150−163 (in
             Chinese with English abstract).
          [6]    Feng CS, Qin ZG, Yuan D, Qing Y. Key techniques of access control for cloud computing. Acta Electronica Sinica, 2015,43(2):
             312−319 (in Chinese with English abstract).
          [7]    Goyal V, Pandey A, Sahai A, Waters B. Attribute-Based encryption for fine-grained access control of encrypted data. In: Juels A,
             Wright RN, Vimercati SDC, eds. Proc. of the 13th ACM Conf. on Computer and Communications Security (CCS 2006). Alexandria:
             ACM, 2006. 89−98.
          [8]    Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Proc. of the 2007 IEEE Symp. on Security and
             Privacy. Washington: IEEE Computer Society, 2007. 321−334. [doi: 10.1109/SP.2007.11]
          [9]    Dan  B, Franklin  M. Identity-Based  encryption from  the Weil pairing. SIAM  Journal on  Computing, 2003,32(3):586−615. [doi:
             10.1137/S0097539701398521]
         [10]    Dan B, Lynn B, Shacham H. Short signatures from the Weil pairing. Journal of Cryptology, 2004,17(4):297−319. [doi: 10.1007/
             s00145-004-0314-9]
         [11]    Green M, Hohenberger S, Waters B. Outsourcing the decryption of ABE ciphertexts. In: Proc. of the 20th Usenix Conf. on Security.
             San Francisco: ACM, 2011.
         [12]    Beimel A. Secure schemes for secret sharing and key distribution [Ph.D. Thesis]. Haifa: Israel Institute of Technology, 1996.
         [13]    Karchmer M, Wigderson A. On span programs. In: Proc. of the Structure in Complexity Theory Conf. San Diego: Springer-Verlag,
             1993. 102−111. [doi: 10.1109/SCT.1993.336536]
         [14]    Waters B. Ciphertext-Policy attribute-based encryption: An expressive, efficient, and provably secure realization. In: Proc. of the
             Public Key Cryptography (PKC 2011). Berlin: Springer-Verlag, 2011. 53−70. [doi: 10.1007/978-3-642-19379-8_4]
         [15]    Zhou  Z,  Huang  D.  Efficient  and secure data storage operations for  mobile  cloud  computing. In: Proc. of the 8th Int’l  Conf. on
             Network and Service Management. Austria: IEEE, 2012. 37−45.
         [16]    Li JW, Jia CF, Li J, Chen XF. Outsourcing encryption of attribute-based encryption with MapReduce. In: Proc. of the 14th Int’l
             Conf. on Information  and  Communications Security.  Berlin: Springer-Verlag, 2012. 191−201. [doi: 10.1007/978-3-642-34129-
             8_17]
         [17]    Lai J, Deng RH, Guan C, Weng J. Attribute-Based encryption with verifiable outsourced decryption. IEEE Trans. on Information
             Forensics and Security, 2013,8(8):1343−1354.
         [18]    Qin  B,  Deng  R,  Liu S, Ma S. Attribute-Based  encryption  with  efficient verifiable outsourced decryption. IEEE  Trans. on
             Information Forensics and Security, 2015,10(7):1384−1393.
         [19]    Lin  S, Zhang R, Ma H, Wang M. Revisiting attribute-based encryption with verifiable  outsourced decryption.  IEEE Trans.  on
             Information Forensics & Security, 2015,10(10):2119−2130.
         [20]    Huang Q, Yang Y, Wang L. Secure data access control with ciphertext update and computation outsourcing in fog computing for
             Internet of things. IEEE Access, 2017,5(99):12941−12950.
         [21]    Canetti R, Krawczyk H, Nielsen JB. Relaxing chosen-ciphertext security. In: Boneh D, ed. Proc. of the Annual Int’l Cryptology
             Conf. Berlin: Heidelberg, 2003. 565−582.
   264   265   266   267   268   269   270   271   272   273   274