ZHANG Yuqing, WANG Xiaofei, LIU Xuefeng, et al. Survey on cloud computing security[J]. Journal of Software, 2016, 27(6): 1328-1348. doi: 10.13328/j.cnki.jos.005004.
|
张玉清, 王晓菲, 刘雪峰, 等. 云计算环境安全综述[J]. 软件学报, 2016, 27(6): 1328-1348. doi: 10.13328/j.cnki.jos.005004.
|
BETHENCOURT J, SAHAI A, and WATERS B. Ciphertext-policy attribute-based encryption[C]. IEEE Symposium on Security and Privacy, Los Alamitos, CA, USA, 2007: 321-334. doi: 10.1109/SP.2007.11.
|
JUNG T, Li X Y, WAN Z, et al. Control cloud data access privilege and anonymity with fully anonymous attribute- based encryption[J]. IEEE Transactions on Information Forensics and Security, 2015, 10(1): 190-199. doi: 10.1109/ TIFS.2014.2368352.
|
唐强, 姬东耀. 多授权中心可验证的基于属性的加密方案[J]. 武汉大学学报(理学版), 2008, 54(5): 607-610. doi: 10.14188/j. 1671-8836.2008.05.029.
|
TANG Qiang and JI Dongyao. Multi-authority verifiable attribute-based encryption[J]. Journal of Wuhan University (Natural Science Edition), 2008, 54(5): 607-610. doi: 10.14188 /j.1671-8836.2008.05.029.
|
CHASE M. Multi-authority attribute based encryption[C]. Theory of Cryptography Conference, Amsterdam, The Netherlands, 2007: 515-534. doi: 10.1007/978-3-540-70936 -7_28.
|
肖思煜, 葛爱军, 马传贵. 去中心化且固定密文长度的基于属性加密方案[J]. 计算机研究与发展, 2016, 53(10): 2207-2215. doi: 10.7544/issn1000-1239.2016.20160459.
|
XIAO Siyu, GE Aijun, and MA Chuangui. Decentralized attribute-based encryption scheme with constant-size ciphertexts[J]. Journal of Computer Research and Development, 2016, 53(10): 2207-2215. doi: 10.7544/issn1000 -1239.2016.20160459.
|
CHASE M and CHOW S S M. Improving privacy and security in multi-authority attribute-based encryption[C]. Proceedings of the 16th ACM Conference on Computer and Communications Security, Chicago, Illinois, USA, 2009: 121-130. doi: 10.1145/1653662.1653678.
|
LEWKO A and WATERS B. Decentralizing attribute-based encryption[C]. Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, 2011: 568-588. doi: 10.1007/978-3-642- 20465-4_31.
|
LIU Z, CAO Z, HUANG Q, et al. Fully secure multi-authority ciphertext-policy attribute-based encryption without random oracles[C]. European Symposium on Research in Computer Security, Leuven, Belgium, 2011: 278-297. doi: 10.1007/978- 3-642-23822-2_16.
|
ROUSELAKIS Y and WATERS B. Efficient statically-secure large-universe multi-authority attribute-based encryption[C]. International Conference on Financial Cryptography and Data Security, San Juan, Puerto Rico, 2015: 315-332. doi: 10.1007/978-3-662-47854-7_19.
|
ZHONG H, ZHU W, XU Y, et al. Multi-authority attribute- based encryption access control scheme with policy hidden for cloud storage[J]. Soft Computing, 2016: 1-9. doi: 10.1007 /s00500-016-2330-8.
|
SCOTT-HAYWARD S, NATARAJAN S, and SEZER S. A survey of security in software defined networks[J]. IEEE Communications Surveys Tutorials, 2016, 18(1): 623-654. doi: 10.1109/COMST.2015.2453114.
|
BLENK A, BASTA A, REISSLEIN M, et al. Survey on network virtualization hypervisors for software defined networking[J]. IEEE Communications Surveys Tutorials, 2016, 18(1): 655-685. doi: 10.1109/COMST.2015.2489183.
|
CHOW S S M. A framework of multi-authority attribute- based encryption with outsourcing and revocation[C]. Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, Shanghai, China, 2016: 215-226. doi: 10.1145/2914642.2914659.
|
LUO E, LIU Q, and WANG G. Hierarchical multi-authority and attribute-based encryption friend discovery scheme in mobile social networks[J]. IEEE Communications Letters, 2016, 20(9): 1772-1775. doi: 10.1109/LCOMM.2016.2584614.
|
魏江宏, 胡学先, 刘文芬. 多属性机构环境下的属性基认证密钥交换协议[J]. 电子与信息学报, 2012, 34(2): 451-456. doi: 10.3724/SP.J.1146.2011.00701.
|
WEI Jianghong, HU Xuexian, and LIU Wenfen. Attribute- based authenticated key exchange protocol in multiple attribute authorities environment[J]. Journal of Electronics Information Technology, 2012, 34(2): 451-456. doi: 10.3724 /SP.J.1146.2011.00701.
|
冯登国, 陈成. 属性密码学研究[J]. 密码学报, 2014, 1(1): 1-12. doi: 10.13868/j.cnki.jcr.000001.
|
FENG Dengguo and CHEN Cheng. Research on attribute- based cryptography[J]. Journal of Cryptologic Research, 2014, 1(1): 1-12. doi: 10.13868/j.cnki.jcr.000001.
|