1. Sahai A, Waters B. Fuzzy identity-based encryption. Advances in Cryptology: Proceedings of the 24th Annual International Conference on Theory and Applications of Cryptographic Techniques (EUROCRYPT’05), 2005, May 22-26, Aarhus, Denmark. LNCS 3494. Berlin, Germany: Springer, 2005: 457-473
2. Shamir A. Identity-based cryptosystems and signature schemes. Advances in Cryptology: Proceedings of the 1984 Workshop on the Theory and Application of Cryptographic Techniques (EUROCRYPT’84), 1984, Apr 9-11, Paris, France. LNCS 196. Berlin, Germany: Springer, 1984: 47-53
3. Goyal V, Pandey O, Sahai A, et al. Attribute-based encryption for fine-grained access control of encrypted data. Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS’06), 2006, Oct 30-Nov 3, Alexandria, VA, USA. New York, NY, USA: ACM, 2006: 89-98
4. Bethencourt J, Sahai A, Waters B. Ciphertext-policy attribute-based encryption. Proceedings of the 2007 IEEE Symposium on Security and Privacy (SP '07), 2007, May 20-23, Berkeley, CA, USA. Piscataway, NJ, USA: IEEE, 2007: 321-334
5. Nishide T, Yoneyama K, Ohta K. Attribute-based encryption with partially hidden encryptor-specified access structures. Applied Cryptography and Network Security: Proceedings of the 6th International Conference on Applied Cryptography and Network Security (ACNS’08), 2008, Jun 3-6, New York, NY, USA. LNCS 5037. Berlin, Germany: Springer, 2008: 111-129
6. Zhong H, Zhu W L, Xu Y, et al. Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage. Soft Computing, 2018, 22: 243-251
7. Li F Q, Liu K M, Zhang L P, et al. EHRChain: A blockchain-based EHR system using attribute-based and homomorphic cryptosystem. IEEE Transactions on Services Computing, DOI:10.1109/TSC.2021.3078119 (To be published)
8. Lai J Z, Deng R H, Li Y J. Fully secure cipertext-policy hiding CP-ABE. Information Security Practice and Experience: Proceedings of the 7th International Conference on Information Security Practice and Experience (ISPEC’11), 2011, May 30-Jun 1, Guangzhou, China. LNCS 6672. Berlin, Germany: Springer, 2011: 24-39
9. Wang H B, Chen S Z. Attribute-based encryption with hidden access structures. Journal of Electronics and Information Technology, 2012, 34(2): 457-561 (in Chinese)
10. Yeh S C, Su M Y, Chen H H, et al. An efficient and secure approach for a cloud collaborative editing. Journal of Network and Computer Applications, 2013, 36(6): 1632-1641
11. Li M T, Huang X Y, Liu J K, et al. GO-ABE: Group-oriented attribute-based encryption. Network and System Security: Proceedings of the 9th International Conference on Network and System Security (NSS’15), 2015, Nov 3-5, New York, NY, USA. LNCS 8792. Berlin, Germany: Springer, 2015: 260-270
12. He P, Yu G, Zhang Y F, et al. Survey on blockchain technology and its application prospect. Computer Science, 2017, 44(4): 1-7 (in Chinese)
13. Hu G C, Zhang L Y, Mu Y, et al. An expressive "test-decrypt-verify" attribute-based encryption scheme with hidden policy for smart medical cloud. IEEE Systems Journal, 2021, 15(1): 365-376
14. Lei L, Cai Q W, Jing J W, et al. Enforcing access controls on encrypted cloud storage with policy hiding. Journal of Software, 2016, 27(6): 1432-1450 (in Chinese)
15. Khuntia S, Syam Kumar P. New hidden policy CP-ABE for big data access control with privacy-preserving policy in cloud computing. Proceedings of the 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT’18), 2018, Jul 10-12, Bengaluru, India. Piscataway, NJ, USA: IEEE, 2018: 7p
16. Jin C C, Feng X Y, Shen Q N. Fully secure hidden ciphertext policy attribute-based encryption with short ciphertext size. Proceedings of the 6th International Conference on Communication and Network Security, 2016, Nov 26-29, Singapore. New York, NY, USA: ACM, 2016: 91-98
17. Gao Z S, Cao L F, Du X H. Research progress of access control based on blockchain. https://kns.cnki.net/kcms/detail/detail.aspx?dbcode=CAPJ&dbname=CAPJLAST&filename=WXAQ2021031900D&uniplatform=NZKPT&v=f7elQvvfxw64hlQaWGhfsXK1FsMtRgFvdh_LfvJqwF4WmgbmGvlPL49YFGANf1b0. 2021 (in Chinese)
18. Zyskind G, Zekrifa D M S, Pentland A S, et al. Decentralizing privacy: using blockchain to protect personal data. Proceedings of the 36th IEEE Symposium on Security and Privacy Workshops, 2015, May 21-22, San Jose, CA, USA. Piscataway, NJ, USA: IEEE, 2015: 180-184
19. Wu A X, Zhang Y H, Zheng X K, et al. Efficient and privacy-preserving traceable attribute-based encryption in blockchain. Annals of Telecommunications, 2019, 74(7/8): 401-411
20. Maesa D, Mori P, Ricci L. Blockchain based access control. Distributed Applications and Interoperable Systems: Proceedings of the 17th IFIP International Conference on Distributed Applications and Interoperable Systems (DAIS’17), 2017, Jun 19-22, Neuchâtel, Switzerland. LNCS 10320. Berlin, Germany: Springer, 2017: 206-220
21. Huang H S, Chang T S, Wu J Y. A secure file sharing system based on IPFS and blockchain. Proceedings of the 2nd International Electronics Communication Conference (IECC’20), 2020, Jul 8-10, Singapore. New York, NY, USA: ACM, 2020: 96-100
22. Tapscott D, Tapscott A. Blockchain revolution: How the technology behind Bitcoin is changing money, business, and the world. Quality Management Journal, 2016, 25(1): 64-65
23. Zhang Y Y, Kasahara S, Shen Y L, et al. Smart contract-based access control for the Internet of things. IEEE Internet of Things Journal, 2019, 6(2): 1594-1605
24. Wang X L, Jiang X Z, Li Y. Model for data access control and sharing based on blockchain. Journal of Software, 2019, 30(6): 1661-1669 (in Chinese)
25. Waters B. Dual system encryption: Realizing fully secure IBE and HIBE under simple assumptions. Advances in Cryptology: Proceedings of the 29th Annual International Cryptology Conference (CRYPTO’09), 2009, Aug 16-20, Santa Barbara, CA, USA. LNCS 5677. Berlin, Germany: Springer, 2009: 619-636
26. Shi Y F, Zheng Q J, Liu J Q, et al. Directly revocable key-policy attribute-based encryption with verifiable ciphertext delegation. Information Sciences, 2015, 295: 221-231
|