[1] 万振, 邱丹, 刘元喆, 等. 国内医疗物联网技术发展及应用现状[J]. 医疗卫生装备, 2020, 41(11): 82-86.
WAN Z, QIU D, LIU Y Z, et al. Development and application status of medical IoT technology in China[J]. Chinese Medical Equipment Journal, 2020, 41(11): 82-86.
[2] HIRECHE R, MANSOURI H, PATHAN A K. Security and privacy management in Internet of medical things (IoMT): a synthesis[J]. Journal of Cybersecurity and Privacy, 2022, 2(3): 640-661.
[3] 李雪莲, 张夏川, 高军涛, 等. 支持属性和代理重加密的区块链数据共享方案[J]. 西安电子科技大学学报, 2022, 49(1): 1-16.
LI X L, ZHANG X C, GAO J T, et al. Blockchain data sharing scheme supporting attribute and proxy re-encryption[J]. Journal of Xidian University, 2022, 49(1): 1-16.
[4] 周艺华, 扈新宇, 李美奇, 等. 云环境下基于属性策略隐藏的可搜索加密方案[J]. 网络与信息安全学报, 2022, 8(2): 112-121.
ZHOU Y H, HU X Y, LI M Q, et al. Searchable encryption scheme based on attribute policy hiding in a cloud environment[J]. Chinese Journal of Network and Information Security, 2022, 8(2): 112-121.
[5] CUI H, DENG R H, LAI J Z, et al. An efficient and expressive ciphertext-policy attribute-based encryption scheme with partially hidden access structures, revisited[J]. Computer Networks, 2018, 133: 157-165.
[6] YING Z B, JIANG W J, LIU X M, et al. Reliable policy updating under efficient policy hidden fine-grained access control framework for cloud data sharing[J]. IEEE Transactions on Services Computing, 2022, 15(6): 3485-3498.
[7] NISHIDE T, YONEYAMA K, OHTA K. Attribute-based encryption with partially hidden encryptor-specified access structures[C]//Proceedings of the 6th International Conference on Applied Cryptography and Network Security. Berlin, Heidelberg: Springer, 2008: 111-129.
[8] WATERS B. Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization[C]//Proceedings of the 2011 International Workshop on Public Key Cryptography. Berlin, Heidelberg: Springer, 2011: 53-70.
[9] 杨耿, 郭瑞, 庄朝源, 等. 云中可动态更新的属性基代理重加密方案[J]. 信息安全学报, 2022, 7(3): 43-55.
YANG G, GUO R, ZHUANG C Y, et al. Dynamically updatable attribute based proxy re-encryption scheme in cloud[J]. Journal of Cyber Security, 2022, 7(3): 43-55.
[10] ATENIESE G, FU K, GREEN M, et al. Improved proxy re-encryption schemes with applications to secure distributed storage[J]. ACM Transactions on Information and System Security, 2006, 9(1): 1-30.
[11] AZBEG K, OUCHETTO O, JAI ANDALOUSSI S. Access control and privacy-preserving blockchain-based system for diseases management[J]. IEEE Transactions on Computational Social Systems, 2023, 10(4): 1515-1527.
[12] 冯朝胜, 罗王平, 秦志光, 等. 支持多种特性的基于属性代理重加密方案[J]. 通信学报, 2019, 40(6): 177-189.
FENG C S, LUO W P, QIN Z G, et al. Attribute-based proxy re-encryption scheme with multiple features[J]. Journal on Communications, 2019, 40(6): 177-189.
[13] LIANG X H, CAO Z F, LIN H, et al. Attribute based proxy re-encryption with delegating capabilities[C]//Proceedings of the 4th International Symposium on Information, Computer, and Communications Security. New York: ACM, 2009: 276-286.
[14] ZHAO J, ZHANG K, GONG J Q, et al. Lavida: large-universe, verifiable, and dynamic fine-grained access control for E-health cloud[J]. IEEE Transactions on Information Forensics and Security, 2024, 19: 2732-2745.
[15] 翟社平, 童彤, 白喜芳. 基于区块链的属性代理重加密数据共享方案[J]. 计算机工程与应用, 2023, 59(8): 270-279.
ZHAI S P, TONG T, BAI X F. Blockchain-based attribute proxy re-encryption data sharing scheme[J]. Computer Engineering and Applications, 2023, 59(8): 270-279.
[16] 刘尚, 郭银章. 云计算多授权中心CP-ABE代理重加密方案[J]. 网络与信息安全学报, 2022, 8(3): 176-188.
LIU S, GUO Y Z. Multi-authority based CP-ABE proxy re-encryption scheme for cloud computing[J]. Chinese Journal of Network and Information Security, 2022, 8(3): 176-188.
[17] SAHAI A, WATERS B. Fuzzy identity-based encryption[C]//Advances in Cryptology-EUROCRYPT 2005: Proceedings of the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Berlin, Heidelberg: Springer, 2005: 457-473.
[18] GE C P, SUSILO W, BAEK J, et al. A verifiable and fair attribute-based proxy re-encryption scheme for data sharing in clouds[J]. IEEE Transactions on Dependable and Secure Computing, 2022, 19(5): 2907-2919.
[19] GE C P, SUSILO W, LIU Z, et al. Attribute-based proxy re-encryption with direct revocation mechanism for data sharing in clouds[C]//Proceedings of the 2023 ACM Turing Award Celebration Conference - China 2023. New York: ACM, 2023: 164-165.
[20] ZHANG C, ZHAO M Y, LIANG J W, et al. NANO: cryptographic enforcement of readability and editability governance in blockchain databases[J]. IEEE Transactions on Dependable and Secure Computing, 2024, 21(4): 3439-3452.
[21] TIAN Y G, LI N, LI Y J, et al. Policy-based chameleon hash for blockchain rewriting with black-box accountability[C]//Proceedings of the 2020 Annual Computer Security Applications Conference. New York: ACM, 2020: 813-828.
[22] WANG L Y, DING W X, YAN Z, et al. EDDAC: an efficient and decentralized data access control scheme with attribute privacy preservation[J]. IEEE Internet of Things Journal, 2024, 11(8): 14579-14592.
[23] CHEN X F, ZHANG F G, SUSILO W, et al. Identity-based chameleon hashing and signatures without key exposure[J]. Information Sciences, 2014, 265: 198-210.
[24] YU G S, ZHA X, WANG X, et al. Enabling attribute revocation for fine-grained access control in blockchain-IoT systems[J]. IEEE Transactions on Engineering Management, 2020, 67(4): 1213-1230.
[25] GUO R, YANG G, SHI H X, et al. O3-R-CP-ABE: an efficient and revocable attribute-based encryption scheme in the cloud-assisted IoMT system[J]. IEEE Internet of Things Journal, 2021, 8(11): 8949-8963.
[26] GE C P, SUSILO W, LIU Z, et al. Secure keyword search and data sharing mechanism for cloud computing[J]. IEEE Transactions on Dependable and Secure Computing, 2021, 18(6): 2787-2800. |