Page 269 - 《软件学报》2020年第12期
P. 269
罗王平 等:一种支持快速加密的基于属性加密方案 3935
References:
[1] Ghemawat S, Gobioff H, Leung ST. The Google file system. In: Juels A, Wright RN, Vimercati SDC, eds. Proc. of the 19th ACM
Symp. on Operating Systems Principles. Alexandria: ACM, 2003. 29−43. [doi: 10.1145/945445.945450]
[2] Sahai A, Waters B. Fuzzy identity based encryption. In: Proc. of the Advances in Cryptology, Eurocrypt. LNCS: Springer-Verlag,
2005. 457−473. [doi: 10.1007/11426639_27]
[3] Lee CC, Chung PS, Hwang MS. A survey on attribute-based encryption schemes of access control in cloud environments. Int’l
Journal of Network Security, 2013,15(4):231−240.
[4] Qiao Z, Liang SW, Davis S, Jiang H. Survey of attribute based encryption. In: Proc. IEEE/ACIS Int’l Conf. on Software
Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing. Austria: IEEE, 2014. 1−6. [doi: 10.1109/
SNPD.2014.6888687]
[5] Feng CS, Qin ZG, Yuan D. Techniques of secure storage for cloud data. Chinese Journal of Computers, 2015,38(1):150−163 (in
Chinese with English abstract).
[6] Feng CS, Qin ZG, Yuan D, Qing Y. Key techniques of access control for cloud computing. Acta Electronica Sinica, 2015,43(2):
312−319 (in Chinese with English abstract).
[7] Goyal V, Pandey A, Sahai A, Waters B. Attribute-Based encryption for fine-grained access control of encrypted data. In: Juels A,
Wright RN, Vimercati SDC, eds. Proc. of the 13th ACM Conf. on Computer and Communications Security (CCS 2006). Alexandria:
ACM, 2006. 89−98.
[8] Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Proc. of the 2007 IEEE Symp. on Security and
Privacy. Washington: IEEE Computer Society, 2007. 321−334. [doi: 10.1109/SP.2007.11]
[9] Dan B, Franklin M. Identity-Based encryption from the Weil pairing. SIAM Journal on Computing, 2003,32(3):586−615. [doi:
10.1137/S0097539701398521]
[10] Dan B, Lynn B, Shacham H. Short signatures from the Weil pairing. Journal of Cryptology, 2004,17(4):297−319. [doi: 10.1007/
s00145-004-0314-9]
[11] Green M, Hohenberger S, Waters B. Outsourcing the decryption of ABE ciphertexts. In: Proc. of the 20th Usenix Conf. on Security.
San Francisco: ACM, 2011.
[12] Beimel A. Secure schemes for secret sharing and key distribution [Ph.D. Thesis]. Haifa: Israel Institute of Technology, 1996.
[13] Karchmer M, Wigderson A. On span programs. In: Proc. of the Structure in Complexity Theory Conf. San Diego: Springer-Verlag,
1993. 102−111. [doi: 10.1109/SCT.1993.336536]
[14] Waters B. Ciphertext-Policy attribute-based encryption: An expressive, efficient, and provably secure realization. In: Proc. of the
Public Key Cryptography (PKC 2011). Berlin: Springer-Verlag, 2011. 53−70. [doi: 10.1007/978-3-642-19379-8_4]
[15] Zhou Z, Huang D. Efficient and secure data storage operations for mobile cloud computing. In: Proc. of the 8th Int’l Conf. on
Network and Service Management. Austria: IEEE, 2012. 37−45.
[16] Li JW, Jia CF, Li J, Chen XF. Outsourcing encryption of attribute-based encryption with MapReduce. In: Proc. of the 14th Int’l
Conf. on Information and Communications Security. Berlin: Springer-Verlag, 2012. 191−201. [doi: 10.1007/978-3-642-34129-
8_17]
[17] Lai J, Deng RH, Guan C, Weng J. Attribute-Based encryption with verifiable outsourced decryption. IEEE Trans. on Information
Forensics and Security, 2013,8(8):1343−1354.
[18] Qin B, Deng R, Liu S, Ma S. Attribute-Based encryption with efficient verifiable outsourced decryption. IEEE Trans. on
Information Forensics and Security, 2015,10(7):1384−1393.
[19] Lin S, Zhang R, Ma H, Wang M. Revisiting attribute-based encryption with verifiable outsourced decryption. IEEE Trans. on
Information Forensics & Security, 2015,10(10):2119−2130.
[20] Huang Q, Yang Y, Wang L. Secure data access control with ciphertext update and computation outsourcing in fog computing for
Internet of things. IEEE Access, 2017,5(99):12941−12950.
[21] Canetti R, Krawczyk H, Nielsen JB. Relaxing chosen-ciphertext security. In: Boneh D, ed. Proc. of the Annual Int’l Cryptology
Conf. Berlin: Heidelberg, 2003. 565−582.