Journal of Guangdong University of Technology ›› 2024, Vol. 41 ›› Issue (04): 106-113.doi: 10.12052/gdutxb.230079
• Computer Science and Technology • Previous Articles
Li Yan-feng1, Zhang Gui-peng2, Lin Lu-bin1, Yang Zhen-guo1, Liu Wen-yin1
CLC Number:
[1] HUANG Q, YAN G, WEI Q. Attribute-based expressive and ranked keyword search over encrypted documents in cloud computing [J]. IEEE Transactions on Services Computing, 2023, 16(2): 957-968. [2] WATERS B. Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization[C]// Public Key Cryptography-PKC 2011: 14th International Conference on Practice and Theory in Public Key Cryptography. Berlin Heidelberg: Springer, 2011: 53-70. [3] GREEN M, HOHENBERGER S, WATERS B. Outsourcing the decryption of ABE ciphertexts[C]//USENIX Security Symposium. [S. l.: s. n.], 2011. [4] QIN B, DENG R H, LIU S, et al. Attribute-based encryption with efficient verifiable outsourced decryption [J]. IEEE Transactions on Information Forensics and Security, 2015, 10(7): 1384-1393. [5] EL GAFIF H, TOUMANARI A. Efficient ciphertext-policy attribute-based encryption constructions with outsourced encryption and decryption[J]. Security and Communication Networks, 2021. DOI:10.1155/2021/8834616. [6] ZHONG H, ZHOU Y, ZHANG Q, et al. An efficient and outsourcing-supported attribute-based access control scheme for edge-enabled smart healthcare [J]. Future Generation Computer Systems, 2021, 115: 486-496. [7] ZHANG L, YOU W, MU Y. Secure outsourced attribute-based sharing framework for lightweight devices in smart health systems [J]. IEEE Transactions on Services Computing, 2022, 15(5): 3019-3030. [8] HONG L, ZHANG K, GONG J, et al. Blockchain-based fair payment for ABE with outsourced decryption [J]. Peer-to-Peer Networking and Applications, 2023, 16(1): 312-327. [9] WANG Y T, CHEN K F, CHEN J H. Attribute-based traitor tracing [J]. Journal of Information Science and Engineering, 2011, 27(1): 181-195. [10] LIU Z, CAO Z, WONG D S. White-box traceable ciphertext-policy attribute-based encryption supporting any monotone access structures [J]. IEEE Transactions on Information Forensics and Security, 2012, 8(1): 76-88. [11] NING J, DONG X, CAO Z, et al. White-box traceable ciphertext-policy attribute-based encryption supporting flexible attributes [J]. IEEE Transactions on Information Forensics and Security, 2015, 10(6): 1274-1288. [12] NING J, CAO Z, DONG X, et al. White-box traceable CP-ABE for cloud storage service: how to catch people leaking their access credentials effectively [J]. IEEE Transactions on Dependable and Secure Computing, 2018, 15(5): 883-897. [13] HAN D, PAN N, LI K C. A traceable and revocable ciphertext-policy attribute-based encryption scheme based on privacy protection [J]. IEEE Transactions on Dependable and Secure Computing, 2022, 19(1): 316-327. [14] HE X, LI L, PENG H. An enhanced traceable CP-ABE scheme against various types of privilege leakage in cloud storage [J]. Journal of Systems Architecture, 2023, 136: 102833. [15] NING J, DONG X, CAO Z, et al. Accountable authority ciphertext policy attribute-based encryption with white-box traceability and public auditing in the cloud[C]//European Symposium on Research in Computer Security. Cham: Springer, 2015, 9327: 270-289. [16] ZHANG X, JIN C, LI C, et al. Ciphertext-policy attribute-based encryption with user and authority accountability[C]//International Conference on Security and Privacy in Communication Systems. Cham: Springer, 2015, 164: 500-518. [17] ZHANG L, ZHAO C, WU Q, et al. A traceable and revocable multi-authority access control scheme with privacy preserving for mHealth [J]. Journal of Systems Architecture, 2022, 130: 102654. [18] HEI Y, LIU J, FENG H, et al. Making MA-ABE fully accountable: a blockchain-based approach for secure digital right management [J]. Computer Networks, 2021, 191: 108029. [19] LI Q, ZHU H, YING Z, et al. Traceable ciphertext-policy attribute based encryption with verifiable outsourced decryption in ehealth cloud[J]. Wireless Communications and Mobile Computing, 2018. DOI:10.1155/2018/1701675. |
[1] | LUO Ming-Yu, LING Jie. A Security Cloud Storage Scheme Based on Cipertext Policy Attributebased Encryption [J]. Journal of Guangdong University of Technology, 2014, 31(4): 36-40.doi: 10.12052/gdutxb.230079 |
|