|
Smart Grid 2015
应用于智能电网中的基于层次属性加密访问控制方法
|
Abstract:
[1] | 余贻鑫, 栾文鹏 (2009) 智能电网. 电网与清洁能源, 1, 7-11. |
[2] | Horwitz, J. and Lynn, B. (2002) Toward hierar-chical identity-based encryption. Advances in Cryptology—EUROCRYPT 2002, Springer Berlin Heidelberg, 466-481. |
[3] | Bethencourt, J., Sahai, A. and Waters, B. (2007) Ciphertext-policy attribute-based encryption. IEEE Symposium on Security and Privacy, 2007. SP'07, IEEE, 321-334. |
[4] | Shamir, A. (1985) Identity-based cryptosystems and signature schemes. Advances in Cryptology, Springer Berlin Heidelberg, 47-53. |
[5] | 王小明, 付红, 张立臣 (2010) 基于属性的访问控制研究进展. 电子学报, 7, 1660-1667. |
[6] | Goyal, V., Pandey, O., Sahai, A., et al. (2006) Attribute-based encryption for fine-grained access control of encrypted data. Proceedings of the 13th ACM conference on Computer and Communications Security. ACM, 89-98. |
[7] | Gentry, C. and Silverberg, A. (2002) Hierarchical ID-based cryptography. Advances in Cryptology—ASIACRYPT 2002, Springer Berlin Heidelberg, 548-566. |
[8] | Müller, S., Katzenbeisser, S. and Eckert, C. (2009) Distributed attribute-based encryption. Information Security and Cryptology—ICISC 2008, Springer Berlin Heidelberg, 20-36. |