1 |
BACKENDAL M, HALLER M, PATERSON K G. MEGA: malleable encryption goes awry[C]//Proc. of the 44th IEEE Symposium on Security and Privacy, 2023: 146-163.
|
2 |
SAHAI A, WATERS B. Fuzzy identity-based encryption[C]//Proc. of the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2005: 457-473.
|
3 |
叶青,陈晴晴,豆永鹏,等.格上身份基可追踪环签名方案[J].西安电子科技大学学报,2025,36(2):698-714.
|
|
YEQ,CHENQ Q,DOUY P,et al.Identity-based traceable ring signature scheme on lattice[J].Journal of Xidian University,2025,36(2):698-714.
|
4 |
陈洁,楚乔涵,杜秋妍,等.标准模型下效率更高的身份基匹配加密[J].软件学报,2025,36(2):698-714.
|
|
CHENJ,CHUQ H,DUQ Y,et al.More efficient identity-based matchmaking encryption under standard model[J].Journal of Software,2025,36(2):698-714.
|
5 |
王晓毅,陈虎,赵姜冬.带抵抗解密密钥暴露的可撤销身份基加密[J].计算机工程与应用,2024,60(19):268-277.
|
|
WANGX Y,CHENH,ZHAOJ D.Revocable identity-based encryption with decryption key exposure resistance[J].Computer Engineering and Applications,2024,60(19):268-277.
|
6 |
GOYAL V, PANDEY O, SAHAI A, et al. Attribute-based encryption for fine-grained access control of encrypted data[C]//Proc. of the 13th ACM Conference on Computer and Communications Security, 2006: 89-98.
|
7 |
HEZ X,CHENY L,LUOY,et al.Revocable and traceable undeniable attribute-based encryption in cloud-enabled E-health systems[J].Entropy,2024,26(1):45.
|
8 |
陈丽莎,李雪莲,高军涛.支持数据完整性验证的可问责数据交易方案[J].系统工程与电子技术,2022,44(4):1364-1371.
doi: 10.12305/j.issn.1001-506X.2022.04.35
|
|
CHENL S,LIX L,GAOJ T.Accountable data trading scheme supporting data integrity verification[J].Systems Engineering and Electronics,2022,44(4):1364-1371.
doi: 10.12305/j.issn.1001-506X.2022.04.35
|
9 |
LIX M,WANGH,MAS.An efficient ciphertext-policy weighted attribute-based encryption with collaborative access for cloud storage[J].Computer Standards & Interfaces,2025,91,103872.
|
10 |
LIY,WANGG Z,FENGH X,et al.Efficient and accountable anti-leakage attribute-based encryption scheme for cloud storage[J].Heliyon,2024,10(12):e32404.
|
11 |
郭丽峰,邢晓敏,郭慧.云存储中高效可追踪可撤销的属性基加密方案[J].密码学报,2023,10(1):131-145.
|
|
GUOL F,XINGX M,GUOH.An efficient traceable and revocable attribute-based encryption scheme in cloud storage[J].Journal of Cryptologic Research,2023,10(1):131-145.
|
12 |
CHENS B,LIJ G,ZHANGY C,et al.Efficient revocable attribute-based encryption with verifiable data integrity[J].IEEE Internet of Things Journal,2024,11(6):10441-10451.
|
13 |
JOSEPHD,MISOCZKIR,MANZANOM,et al.Transitioning organizations to post-quantum cryptography[J].Nature,2022,605,237-243.
|
14 |
REGEV O. On lattices, learning with errors, random linear codes, and cryptography[C]//Proc. of the 37th Annual ACM Symposium on Theory of Computing, 2005: 84-93.
|
15 |
YAOY F,CHENH Y,GAOY,et al.A decentralized multi-authority CP-ABE scheme from LWE[J].Journal of Information Security and Applications,2024,82,103752.
|
16 |
LYUBASHEVSKY V, PEIKERT C, REGEV O. On ideal lattices and learning with errors over rings[C]//Proc. of the 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2010: 1-23.
|
17 |
ZHANG J, ZHANG Z F, GE A J. Ciphertext policy attribute-based encryption from lattices[C]//Proc. of the 7th ACM Symposium on Information, Computer and Communications Security, 2012: 16-17.
|
18 |
WANGY T.Lattice ciphertext policy attribute-based encryption in the standard model[J].International Journal of Network Security,2014,16(6):444-451.
|
19 |
CHENZ H,ZHANGP,ZHANGF G,et al.Ciphertext policy attribute-based encryption supporting unbounded attribute space from RLWE[J].KSII Trans.on Internet and Information Systems,2017,11(4):2292-2309.
|
20 |
GURK D,POLYAKOVY,ROHLOFFK,et al.Practical applications of improved Gaussian sampling for trapdoor lattices[J].IEEE Trans.on Computers,2019,68(4):570-584.
|
21 |
DATTA P, KOMARGODSKI I, WATERS B. Decentralized multi-authority ABE for DNFs from LWE[C]//Proc. of the 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2021: 177-209.
|
22 |
CHENE,ZHUY,LIANGK T,et al.Secure remote cloud file sharing with attribute-based access control and performance optimization[J].IEEE Trans.on Cloud Computing,2023,11(1):579-594.
|
23 |
SAHAI A, SEYALIOGLU H, WATERS B. Dynamic credentials and ciphertext delegation for attribute-based encryption[C]// Proc. of the 32nd Annual Cryptology Conference, 2012: 199-217.
|
24 |
WANGS P,ZHANGX,ZHANGY L.Efficient revocable and grantable attribute-based encryption from lattices with fine-grained access control[J].IET Information Security,2018,12(2):141-149.
|
25 |
CHENGL X,MENGF,MENGX M,et al.AKC-based revocable ABE schemes from LWE assumption[J].Security and Communication Networks,2020,2020(5):1-16.
|
26 |
YANGY,SUNJ G,LIUZ C,et al.Practical revocable and multi-authority CP-ABE scheme from RLWE for cloud computing[J].Journal of Information Security and Applications,2022,65,103108.
|
27 |
HUANGB X,GAOJ T,LIX L.Efficient lattice-based revocable attribute-based encryption against decryption key exposure for cloud file sharing[J].Journal of Cloud Computing,2023,12,37.
|
28 |
LUOF C,AL-KUWARIS,WANGH Y,et al.Revocable attribute-based encryption from standard lattices[J].Computer Standards & Interfaces,2023,84,103698.
|
29 |
AGRAWAL S, BONEH D, BOYEN X. Efficient lattice (H)IBE in the standard model[C]//Proc. of the 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2010: 553-572.
|
30 |
YANGX Y,WUL Q,ZHANGM Q,et al.An efficient CCA-secure cryptosystem over ideal lattices from identity-based encryption[J].Computers and Mathematics with Applications,2013,65(9):1254-1263.
|
31 |
DAIW,DOROZY,POLYAKOVY,et al.Implementation and evaluation of a lattice-based key-policy ABE scheme[J].IEEE Trans.on Information Forensics & Security,2018,13(5):1169-1184.
|
32 |
NAOR D, NAOR M, LOTSPIECH J. Revocation and tracing schemes for stateless receivers[C]//Proc. of the 21st Annual International Cryptology Conference, 2001: 19-23.
|
33 |
陈娥. 面向公钥群组密码的高效签名与加密技术研究[D]. 北京: 北京科技大学, 2022.
|
|
CHEN E. Research on efficient signature and encryption technologies for public-key group-oriented cryptography[D]. Beijing: University of Science and Technology, 2022.
|
34 |
孟飞. 将属性加密体制应用于云存储中关键问题的研究[D]. 济南: 山东大学, 2021.
|
|
MENG F. Research on key issues of applying attribute-based encryption to cloud storage[D]. Ji'nan: Shandong University, 2021.
|