[1] |
苏金树, 曹丹, 王小峰 , 等. 属性基加密机制[J]. 软件学报, 2011,22(6): 1299-1315. SU J S , CAO D , WANG X F , et al. Attribute-based encryption schemes[J]. Journal of Software, 2011,22(6): 1299-1315.
|
[2] |
SAHAI A , WATERS B . Fuzzy identity-based encryption[A]. Ad-vances in the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques(EUROCRYPT 2005)[C]. Aarhus,Denmark, 2005.457-473.
|
[3] |
GOYAL V , PANDEY O , SAHAI A , et al. Attribute-based encryption for fine-grained access control of encrypted data[A]. Proceedings of the 13th ACM Conference on Computer and Communications Security[C]. Alexandria,VA,USA, 2006.89-98.
|
[4] |
BETHENCOUNT J , SAHAI A , WATERS B . Ciphertext-policy attrib-ute-based encryption[A]. Proceedings of the 2007 IEEE Symposium on Security and Privacy(IEEE S&P 2007)[C]. Oakland,CA,USA, 2007.321-334.
|
[5] |
KAPADIA A , TSANG PP , SMITH S W . Attribute-based publishing with hidden credential and hidden policies[A]. Proceedings of the 14th Annual Network and Distributed System Security Symposim(NDSS 2007)[C]. San Diego,CA,USA, 2007.179-192.
|
[6] |
NISHIDE T , YONEYAMA K , OHTA K . Attribute-based encryption with partially hidden encryptor-specified access structures[A]. Pro-ceedings of the Applied Cryptography and Network Security (ACNS 2008) [C]. New York,NY,USA, 2008.111-129.
|
[7] |
LAI J Z , DENG R H , LI Y J . Fully secure cipertext-policy hiding CP-ABE[A]. Proceedings of the 7th Information Security Practice and Experience(ISPEC 2011)[C]. Guangzhou,China, 2011.24-39.
|
[8] |
王海斌, 陈少真 . 隐藏访问结构的基于属性加密方案[J]. 电子与信息学报, 2012,34(2): 457-561. WANG H B , CHEN S Z . Attribute-based encryption with hidden ac-cess structures[J]. Journal of Electronics and Information Technology, 2012,34(2): 457-561.
|
[9] |
FREEMAN M . Converting pairing-based cryptosystems from com-posite-order groups to prime-order groups[A]. Advances in Advances in the 29th Annual International Conference on the Theory and Appli-cations of Cryptographic Techniques(EUROCRYPT 2010)[C]. Aarhus,Denmark, 2010.44-61.
|
[10] |
IBRAIMI L , TANG Q , HARTEL P , et al. Efficient and provable se-cure ciphertext-policy attribute-based encryption schemes[A]. Pro-ceedings of the Information Security Practice and Experience[C]. Xi'an,China, 2009.1-12.
|
[11] |
BONEH D , GOH E , NISSIM K . Evaluating 2-dnf formulas on cipher-texts[A]. Proceedings of the 1st Theory of Cryptography Confer-ence(TCC 2005)[C]. Cambridge,MA,USA, 2005.325-341.
|
[12] |
WATERS B . Dual system encryption:realizing fully secure ibe and hibe under simple assumptions[A]. Advances in the 29th International CryptologyConference(CRYPTO 2009)[C]. Santa Barbara,CA,USA, 2009.619-636.
|
[13] |
LYNN B . The pairing-based cryptography(PBC) library[EB/OL]. .
|
[14] |
BETHENCOURT J , SAHAI A , WATERS B . Advanced crypto soft-ware collection:the cpabetoolkit[EB/OL]. . 2011.
|