Citation: | NIU Shufen, GE Peng, SONG Mi, SU Yun. A Privacy Protection Scheme Based on Attribute Encryption in Mobile Social Networks[J]. Journal of Electronics & Information Technology, 2023, 45(3): 847-855. doi: 10.11999/JEIT221174 |
[1] |
QIU Tie, CHEN Baochao, SANGAIAH A K, et al. A survey of mobile social networks: Applications, social characteristics, and challenges[J]. IEEE Systems Journal, 2018, 12(4): 3932–3947. doi: 10.1109/JSYST.2017.2764479
|
[2] |
SAHAI A and WATERS B. Fuzzy identity-based encryption[C]. The 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, 2005: 457–473.
|
[3] |
SAIDI A, NOUALI O, and AMIRA A. SHARE-ABE: An efficient and secure data sharing framework based on ciphertext-policy attribute-based encryption and Fog computing[J]. Cluster Computing, 2022, 25(1): 167–185. doi: 10.1007/s10586-021-03382-5
|
[4] |
FU Xingbing, WANG Yinglun, YOU Lin, et al. Offline/Online lattice-based ciphertext policy attribute-based encryption[J]. Journal of Systems Architecture, 2022, 130: 102684. doi: 10.1016/j.sysarc.2022.102684
|
[5] |
DENG Shijie, YANG Gaobo, DONG Wen, et al. Flexible revocation in ciphertext-policy attribute-based encryption with verifiable ciphertext delegation[J/OL]. Multimedia Tools and Applications, 2022.
|
[6] |
LI Jiguo, ZHANG Yichen, NING Jianting, et al. Attribute based encryption with privacy protection and accountability for CloudIoT[J]. IEEE Transactions on Cloud Computing, 2022, 10(2): 762–773. doi: 10.1109/TCC.2020.2975184
|
[7] |
WANG Shulan, ZHOU Junwei, LIU J K, et al. An efficient file hierarchy attribute-based encryption scheme in cloud computing[J]. IEEE Transactions on Information Forensics and Security, 2016, 11(6): 1265–1277. doi: 10.1109/TIFS.2016.2523941
|
[8] |
HUANG Qinlong, YANG Yixian, and FU Jingyi. PRECISE: Identity-based private data sharing with conditional proxy re-encryption in online social networks[J]. Future Generation Computer Systems, 2018, 86: 1523–1533. doi: 10.1016/j.future.2017.05.026
|
[9] |
ZHOU Lei, LUO Entao, WANG Guojun, et al. Secure fine-grained friend-making scheme based on hierarchical management in mobile social networks[J]. Information Sciences, 2021, 554: 15–32. doi: 10.1016/j.ins.2020.12.012
|
[10] |
CUI Weirong, DU Chenglie, CHEN Jinchao, et al. CP-ABE based privacy-preserving user profile matching in mobile social networks[J]. PLoS One, 2016, 11(6): e0157933. doi: 10.1371/journal.pone.0157933
|
[11] |
CUI Hui, DENG R H, LAI Junzuo, et al. An efficient and expressive ciphertext-policy attribute-based encryption scheme with partially hidden access structures, revisited[J]. Computer Networks, 2018, 133: 157–165. doi: 10.1016/j.comnet.2018.01.034
|
[12] |
YANG Kan, HAN Qi, LI Hui, et al. An efficient and fine-grained big data access control scheme with privacy-preserving policy[J]. IEEE Internet of Things Journal, 2017, 4(2): 563–571. doi: 10.1109/JIOT.2016.2571718
|
[13] |
PREMKAMAL P K, PASUPULETI S K, and ALPHONSE P J A. A new verifiable outsourced ciphertext-policy attribute based encryption for big data privacy and access control in cloud[J]. Journal of Ambient Intelligence and Humanized Computing, 2019, 10(7): 2693–2707. doi: 10.1007/s12652-018-0967-0
|
[14] |
ZHANG Zhishuo and ZHOU Shijie. A decentralized strongly secure attribute-based encryption and authentication scheme for distributed Internet of Mobile Things[J]. Computer Networks, 2021, 201: 108553. doi: 10.1016/j.comnet.2021.108553
|
[15] |
FENG Chaosheng, YU Keping, ALOQAILY M, et al. Attribute-based encryption with parallel outsourced decryption for edge intelligent IoV[J]. IEEE Transactions on Vehicular Technology, 2020, 69(11): 13784–13795. doi: 10.1109/TVT.2020.3027568
|
[16] |
LI Jiguo, SHA Fengjie, ZHANG Yichen, et al. Verifiable outsourced decryption of attribute-based encryption with constant ciphertext length[J]. Security and Communication Networks, 2017, 2017: 3596205. doi: 10.1155/2017/3596205
|