[1] K. Han, Q. B. Li,Z. L. Deng, “Security and Efficiency Data Sharing Scheme for Cloud Storage,” Chaos, Solitons and Fractals, Vol. 86, No. 6, pp. 107-116, 2016 [2] A. Sahai and B. Waters, “Fuzzy Identity-based Encryption,” in Proceedings of Annual International Conferences on the Theory and Applications of Cryptographic Techniques, pp. 457-473, 2005 [3] V. Goyal, O. Pandey, A. Sahai,B. Waters, “Attribute-based Encryption for Finegrained Access Control of Encrypted Data,” in Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS 2006), Alexandria: ACM Press, pp. 89-98, 2006 [4] J. Bethencourt, A. Sahai,B. Waters, “Ciphertext-Policy Attribute-based Encryption,” in Proceedings of 2007 IEEE Symposium on Security and Privacy (S&P 2007), Berkeley: IEEE Press, pp. 321-334, 2007 [5] M. Li, S. C. Yu,Y. Zheng, “Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-based Encryption,” IEEE Transactions on Parallel & Distributed Systems, Vol. 24, No. 1, pp. 131-143, 2012 [6] Q. Liu, G. J. Wang,J. Wu, “Time-based Proxy Re-Encryption Scheme for Secure Data Sharing in a Cloud Environment,” Information Sciences, Vol. 238, No. 3, pp. 355-370, 2014 [7] A. Lewko and B. Waters, “Decentralizing Attribute-based Encryption,” Paterson, K.G. (eds) Advances in Cryptology-EUROCRYPT 2011, LNCS, Tallinn: Springer Press, Vol. 6632, pp. 568-588, 2011 [8] I. Ray and N. Narasimhamurthi, “A Cryptographic Solution to Implement Access Control in a Hierarchy and More,” in Proceedings of the Seventh ACM Symposium on Access Control Models and Technologies (SACMAT 2002), Monterey: ACM Press, pp. 65-73, 2002 [9] R. Sushmita, N. Amiya,S. Ivan, “DACC: Distributed Access Control in Clouds,” in Proceedings of the 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2011), Changsha: IEEE Press, pp.91-98, 2011 [10] L. N.Lei and Y. Li, “CP-ABE based Data Access Control Scheme with Multi-Authorities,” Application Research of Computers, Vol.35, No. 1, pp. 248-252:276, 2018 [11] L. J. Xie, Z. Q. Zhu, L. Sun,N. Pan, “Research and Design of Cloud Computing Key Management Framework,” Application Research of Computers, Vol. 30, No. 3, pp. 909-912, 2013 [12] A. SuphaLakshmi and M. Revathi, “Secure Data Sharing Using 3-Party Decentralized Communication,” in Proceedings of 2016 10th International Conference on Intelligent Systems and Control (ISCO 2016), Coimbatore: IEEE Press, pp. 1-5, 2016 [13] S. Han, “Research on Key Technologies of Secured Data Sharing in Cloud Storage,” Ph.D. Thesis, Beijing University of Posts and TeleCommuncations, pp. 16-32, 2015 [14] Y. Wang, Z. F. Hou, X. Q Zhang,M. J. Huang, “Threshold Signature Scheme based on Chinese Remainder Theorem Without a Trusted Party,” Journal of Computer Applications, Vol. 38, No. 4, pp. 1041-1045, 2018 |