[1] |
SAHAI A , WATERS B . Fuzzy identity-based encryption[C]// The International Conference on Theory and Applications of Cryptographic Techniques. 2005: 457-473.
|
[2] |
LI M T , HUANG X Y , LIU J K ,et al. GOABE:group-oriented attribute-based encryption[C]// The 8th International Conference on Network and System Security( NSS 2014). 2014: 260-270.
|
[3] |
BALU A , KUPPUSAMY K . An expressive and provably secure cipher-text-policy attribute-based encryption[J]. Information Sciences, 2014,276(4): 354-362.
|
[4] |
GOYAL V , PANDEY O , SAHAI A ,et al. Attribute-based encryption for fine-grained access control of encrypted data[C]// The 13th ACM Conference on Computer and Communications Security ( CCS 2006). 2006: 89-98.
|
[5] |
OSTROVSKY R , SAHAI A , WATERS B . Attribute-based encryption with non-monotonic access structures[C]// The 14th ACM Conference on Computer and Communications Security ( CCS 2007). 2007: 195-203.
|
[6] |
ATTRAPADUNG N , LIBERT B , PANAFIEU E D . Expressive key-policy attribute-based encryption with constant-size ciphertexts[C]// Public Key Cryptography ( PKC 2011). 2011: 90-108.
|
[7] |
GE A , ZHANG R , CHEN C ,et al. Threshold ciphertext policy attribute-based encryption with constant size ciphertexts[C]// The 17th Australasian Conference on Information Security and Privacy (ACISP 2012). 2012: 336-349.
|
[8] |
BOLDYREVA A , GOYAL V , KUMAR V . Identity-based encryption with efficient revocation[C]// The 15th ACM Conference on Computer and Communications Security(CCS 2008). 2008: 417-426.
|
[9] |
YU S , WANG C , REN K ,et al. Attribute based data sharing with attribute revocation[C]// The 5th ACM Symposium on Information,Computer and Communications Security(ASIACCS 2010). 2010: 261-270.
|
[10] |
CHASE M , . Multi-authority attribute based encryption[C]// The 4th Theory of Cryptography Conference (TCC 2006). 2007: 515-534.
|
[11] |
CHASE M , CHOW S S M . Improving privacy and security in multiauthority attribute-based encryption[C]// The 16th ACM Conference on Computer and Communications Security (CCS 2009). 2009: 121-130.
|
[12] |
LI M , YU S , ZHENG Y ,et al. Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption[J]. IEEE Transactions on Parallel and Distributed Systems, 2013,4(1): 131-143.
|
[13] |
YAN H , LI X , LI J . Secure personal health record system with attribute-based encryption in cloud computing[C]// The 9th International Conference on P2P,Parallel,Grid,Cloud and Internet Computing(3PGCIC). 2014: 329-332.
|
[14] |
BETHENCOURT J , SAHAI A , WATERS B . Ciphertext-policy attribute-based encryption[C]// IEEE Symposium on Security and Privacy (SP 2007). 2007: 321-334.
|
[15] |
EMURA K , MIYAJI A , NOMURA A ,et al. A ciphertextpolicy attribute-based encryption scheme with constant ciphertext length[J]. International Journal of Applied Cryptography, 2009,5451(1): 13-23.
|
[16] |
HERRANZ J , LAGUILLAUMIE F , RAFOLS C . Constant size ciphertexts in threshold attribute-based encryption[C]// The 13th Internation Conference on Practice and Theory in Public Key Cryptography (PKC 2010). 2010: 19-34.
|
[17] |
CHEN C , ZHANG Z F , FENG D G . Efficient ciphertext policy attribute-based encryption with constant-size ciphertext and constant computation-cost[C]// The 5th International Conference on Provable Security ( ProvSec). 2011: 84-101.
|
[18] |
YU S , WANG C , REN K ,et al. Attribute based data sharing with attribute revocation[C]// The 5th ACM Symposium on Information,Computer and Communications Security (ASIACCS’10). 2010: 261-270.
|
[19] |
LIANG X , LU R , LIN X . Ciphertext policy attribute based encryption with efficient revocation[C]// IEEE Symposium on Security and Privacy. 2010: 321-334.
|
[20] |
MULLER S , KATZENBEISSER S ,et al. On multi-authority ciphertextpolicy attribute-based encryption[J]. Bulletin of the Korean Mathematical Society, 2009,46(4): 803-819.
|
[21] |
LIN H , CAO Z , LIANG X ,et al. Secure threshold multi authority attribute based encryption without a central authority[J]. Information Sciences, 2008,180(13): 2618-2632.
|
[22] |
XHAFA F , LI J , ZHAO G ,et al. Designing cloud-based electronic health record system with attribute-based encryption[J]. Multimedia Tools and Applications, 2015,74(10): 3441-3458.
|
[23] |
BEIMEL A . Secure schemes for secret sharing and key distribution[J]. International Journal of Pure &Applied Mathematics, 1996.
|
[24] |
DAMGARD I , THORBEK R . Linear integer secret sharing and distributed exponentiation[C]// The International Conference on Theory and Practice of Public-Key Cryptography. 2006: 75-90.
|