Goyal V,Pandey O,Sahai A,et al.Attribute-based encryption for fine-grained access control of encrypted data[C]// The 13th ACM Conference on Computer and Communications Security.New York:ACM,2006:89-98.
[4]
Bethencourt J,Sahai A,Waters B.Ciphertext-policy attribute-based encryption[C]//IEEE Symposium on Security and Privacy.Piscataway:IEEE,2007:321-334.
Hohenberger S,Waters B.Attribute-based encryption with fast decryption[M].Berlin:Springer,2013:162-179.
[7]
Douceur J R,Adya A,Bolosky W J,et al.Reclaiming space from duplicate files in a serverless distributed file system[C]// The 22nd International Conference on Distributed Computing Systems.Piscataway:IEEE,2002:617-624.
[8]
Shamir A.How to share a secret[J].Communications of the ACM,1979,24(11):612-613.(上接第1415页)语义,索引策略及两种查询算法,并设计了基于分值剪枝及空间剪枝策略的优化机制,最后通过基于多个真实数据集的实验验证了所提算法的有效性.