共 27 条
- [1] FENG C S, QIN Z G, YUAN D, Et al., Key techniques of access control for cloud computing, Acta Electronica Si-nica, 43, 2, (2015)
- [2] BETHENCOURT J, SAHAI A, WATERS B., Ciphertext‑ policy attribute‑based encryption, 2007 IEEE Sympo-sium on Security and Privacy (SP'07), (2007)
- [3] LI J, ZHANG Y H, CHEN X F, Et al., Secure attribute‑ based data sharing for resource‑limited users in cloud com-puting, Computers & Security, 72, pp. 1-12, (2018)
- [4] ZHAO Z Y, WANG J H, ZHU Z Q, Et al., Attribute‑based encryption for data security sharing of Internet of Things, Journal of Computer Research and Development, 56, 6, (2019)
- [5] CHEN N Y, LI J G, ZHANG Y C, Et al., Efficient CP‑ABE scheme with shared decryption in cloud storage, IEEE Transactions on Computers, 71, 1, (2022)
- [6] ZHANG L Y, CUI Y L, MU Y., Improving security and privacy attribute based data sharing in cloud computing, IEEE Systems Journal, 14, 1, (2020)
- [7] GUAN Z T, YANG T T, XU R Z, Et al., Multi‑authority at-tribute‑based encryption access control model for cloud storage, Journal on Communications, 36, 6, (2015)
- [8] CHASE M., Multi‑authority attribute based encryption, Theory of Cryptography, pp. 515-534, (2007)
- [9] LEWKO A, WATERS B., Decentralizing attribute‑based encryption, Advances in Cryptology—EUROCRYPT 2011, pp. 568-588, (2011)
- [10] GAO S, PIAO G R, ZHU J M, Et al., TrustAccess: A trust-worthy secure ciphertext‑policy and attribute hiding ac-cess control scheme based on blockchain, IEEE Trans-actions on Vehicular Technology, 69, 6, pp. 5784-5798, (2020)