[1] |
CHEN J F , XIANG H Y , LI J W . A brief study of attribute-based encryption[R]. 2017.
|
[2] |
SAHAI A , WATERS B . Fuzzy identity-based encryption[C]// Annual International Conference on the Theory and Applications of Cryptographic Techniques. 2005: 457-473.
|
[3] |
VAANCHIG N , CHEN W , QIN Z G . An attribute-based access control with efficient and secure attribute revocation for cloud data sharing service[J]. Journal of Electronic Science and Technology, 2017(1): 90-98.
|
[4] |
GOYAL V , PANDEY O , SAHAI A ,et al. Attribute-based encryption for fine-grained access control of encrypted data[C]// The 13th ACM Conference on Computer and Communications Security. 2006: 89-98.
|
[5] |
SU J S , CAO D , WANG X F ,et al. Attribute-based encryption schemes[J]. Journal of Software, 2011,22(6): 1299-1315.
|
[6] |
WANG Z W , HE M J , KANG L W . CP-ABE with hidden policy from waters efficient construction[J]. International Journal of Distributed Sensor Networks, 2016,12(1).
|
[7] |
KAPADIA A , T P P , SMITH S W . Attribute-based publishing with hidden credentials and hidden policies[C]// Formation Security Practice and Experience, 2009: 1-12
|
[8] |
NISHIDE T , YONEYAMA K , OHTA K . Attribute-based encryption with partially hidden encryptor-specified access structures[C]// The Applied Cryptography and Network Security (ACNS 2008). 2008: 111-129.
|
[9] |
MULLER S , KATZENBEISSER S . HIDING the policy in cryptographic access control[M]// Security and Trust Management.Berlin:Springer. 2012: 90-105.
|
[10] |
WENG A X , LING J . Improved scheme of CP-ABE with hidden access structure[J]. Computer Science, 2017,44(11A): 377-380.
|
[11] |
YING Z B , MA J F , CUI J T . Partially policy hidden CP-ABE supporting dynamic policy updating[J]. Journal on Communications, 2015,36(12): 178-188.
|
[12] |
LIU W Y , WANG Z W . Improved CP-ABE Scheme with outsourced decryption and hidden policy[J]. Computer Technology and Development, 2017,27(7): 101-105.
|
[13] |
LAI J Z , DENG R H , LI Y J . Fully secure ciphertext-policy hiding CP-ABE[C]// The 7th International Conference on Information Security Practice and Experience. 2011: 24-39.
|
[14] |
CHASE M . Multi-authority attribute based encryption[M]. Theory of Cryptography.Bertin:Springer. 2007.
|
[15] |
HAN K , LI Q B , DENG Z L . Security and efficiency data sharing scheme for cloud storage[C]// Chaos,Solitons and Fractals. 2016: 107-116.
|
[16] |
LUAN I , TANG Q , HARTEL P ,et al. Efficient and provable secure ciphertext-policy attribute-based encryption schemes[C]// International Conference on Information Security Practice and Experience. 2009: 1-12.
|
[17] |
TAN S Y , YAP W S . Cryptanalysis of a CP-ABE scheme with policy in normal forms[J]. Information Processing Letters, 2016,7(116): 492-495.
|
[18] |
LEWKO A , WATERS B . Decentralizing attribute-based encryption[M]. Berlin: SpringerPress, 2011.
|
[19] |
ODELU V , DAS A K , RAO Y S ,et al. Pairing-based CP-ABE with constant-size ciphertexts and secret keys for cloud environment[J]. Computer Standards & Interfaces, 2016.
|
[20] |
HWANG J Y , KIM H J , LEE D H ,et al. An enhanced (t,n) threshold directed signature scheme[J]. Information Sciences, 2014,275: 284-292.
|
[21] |
DENG L , ZENG J . Two new identity-based threshold ring signature schemes[J]. Theoretical Computer Science, 2014,53(5): 38-45.
|
[22] |
HONG H S , SUN Z X . An efficient and secure attribute based signcryption scheme with LSSS access structure[J]. SpringPlus, 2016,5(1): 1-10.
|
[23] |
CHEN L Q , ZHU Z , WANG M Y ,et al. A threshold group signature scheme for moblile Internet application[J]. Chinese Journal of Computers, 2017,40: 1-18.
|