[9] |
WATERS B , . Ciphertext-policy attribute-based encryption:An expressive,efficient,and provably secure realization[C]// Public Key Cryptography-PKC. c2011: 53-70.
|
[10] |
LAI J , DENG R H , GUAN C ,et al. Attribute-based encryption with verifiable outsourced decryption[J]. Information Forensics and Security, 2013,8(8): 1343-1354.
|
[11] |
LIN S , ZHANG R , MA H ,et al. Revisiting attribute-based encryption with verifiable outsourced decryption[J]. Information Forensics and Security, 2015,10(10): 2119-2130.
|
[12] |
LI J , JIA C , LI J ,et al. Outsourcing encryption of attribute-based encryption with mapreduce[C]// The 14th Information and Communications Security. c2012: 191-201.
|
[13] |
LI J , CHEN X , LI J ,et al. Fine-grained access control system based on outsourced attribute-based encryption[C]// Computer Security-ESORICS. c2013: 592-609.
|
[14] |
LI J , HUANG X , LI J ,et al. Securely outsourcing attribute-based encryption with checkability[J]. Parallel and Distributed Systems, 2014,25(8): 2201-2210.
|
[15] |
MA H , ZHANG R , WAN Z ,et al. Verifiable and exculpable outsourced attribute-based encryption for access control in cloud computing[J]. IEEE Transactions on Parallel and Distributed Systems, 2015:1.
|
[16] |
HOHENBERGER S , WATERS B . Online/offline attribute-based encryption[C]// Public-Key Cryptography–PKC 2014. Berlin:Springer, 2014: 293-310.
|
[17] |
ROUSELAKIS Y , WATERS B . Practical constructions and new proof methods for large universe attribute-based encryption[C]// The 2013 ACM SIGSAC Conference on Computer & Communications Security. c2013: 463-474.
|
[18] |
SHAO J , LU R , LIN X . Fine-grained data sharing in cloud computing for mobile devices[C]// Computer Communications (INFOCOM). c2015: 2677-2685.
|
[19] |
BEIMEL A , . Secure schemes for secret sharing and key distribution[M]// Israel Institute of Technology. Haifa:Technion, 1996.
|
[20] |
LIANG K , SUSILO W . Searchable attribute-based mechanism with efficient data sharing for secure cloud storage[J]. IEEE Transactions on Information Forensics and Security, 2015,10(9): 1981-1992.
|
[1] |
SAHAI A , WATERS B . Fuzzy identity-based encryption[C]// International Conference on Theory and Applications of Cryptographic Techniques. c2005: 457-473.
|
[2] |
LIANG X , CAO Z , LIN H ,et al. Attribute based proxy re-encryption with delegating capabilities[C]// The 4th International Symposium on Information,Computer,and Communications Security,ACM. c2009: 276-286.
|
[3] |
CHEUNG L , NEWPORT C . Provably secure ciphertext policy ABE[C]// The 14th ACM conference on Computer and Communications Security. c2007: 456-465.
|
[4] |
LUO S , HU J , CHEN Z . Ciphertext policy attribute-based proxy re-encryption[C]// The 12th Information and Communications Security. c2010: 401-415.
|
[5] |
HOHENBERGER S , WATERS B . Attribute-based encryption with fast decryption[M]// Public-Key Cryptography-PKC 2013.Berlin:Springer. 2013: 162-179.
|
[6] |
GREEN M , HOHENBERGER S , WATERS B . Outsourcing the Decryption of ABE Ciphertexts[C]// USENIX Security Symposium. c2011.
|
[7] |
GOYAL V , PANDEY O , SAHAI A ,et al. Attribute-based encryption for fine-grained access control of encrypted data[C]// The 13th ACM Conference on Computer and Communications Security. c2006: 89-98.
|
[8] |
LEWKO A , OKAMOTO T , SAHAI A ,et al. Fully secure functional encryption:attribute-based encryption and (hierarchical) inner product encryption[C]// Advances in Cryptology-EUROCRYPT. c2010: 62-91.
|
[21] |
LIIN S , ZHANG R , WANG M . Verifiable attribute-based proxy re-encryption for secure public cloud data sharing[J]. Security and Communication Networks, 2016.
|