[1] |
SAHAI A , WATERS B . Fuzzy identity-based encryption[A]. Advances in Cryptology - EUROCRYPT 2005[C]. Berlin,Heidelberg,Springer Verlag, 2005. 457-473.
|
[2] |
OSTROVSKY R , SAHAI A , WATERS B . Attribute-based encryption with non-monotonic access structures[A]. Proc of the ACM Conf on Computer and Communications Security[C]. New York, 2007. 195-203.
|
[3] |
ATTAPADUNG N , IMAI H . Conjunctive broadcast and attribute-based encryption[A]. Proc of the Pairing-Based CryptographyPairing 2009[C]. Berlin,Heidelberg: Springer-Verlag, 2009. 248-265.
|
[4] |
王鹏翩, 冯登国, 张立武 . 一种支持完全细粒度属性撤销的 CP-ABE方案[J]. 软件学报, 2012,23(10): 2805-2816. WANG P P , FENG D G , ZHANG L W . CP-ABE scheme supporting fully fine-grained attribute revocation[J]. Journal of Software, 2012,23(10): 2805-2816.
|
[5] |
WU Q X . A generic construction of ciphertext-policy attribute-based encryption supporting attribute revocation[J]. In:China communications, 2014,11(1): 93-100.
|
[6] |
PIRRETTI M , TRAYNOR P , MCDANIEL P ,et al. Secure attribute-based systems[A]. Proc of the ACM Conf.on Computer and Communications Security[C]. New York, 2006. 99-111.
|
[7] |
BETHENCOURT J , SAHAI A , WATERS B . Ciphertext-policy attribute-based encryption[A]. Proc of the 2007 IEEE Symp on Security and Privacy[C]. Washington,IEEE Computer Society, 2007. 322-334.
|
[8] |
BOLDYREVA A , GOYAL V , KUMAR V . Identity-based encryption with efficient revocation[A]. Proc of the ACM Conf on Computer and Communications Security[C]. New York, 2008. 417-426.
|
[9] |
IBRAIMI L , PETKOVIC M , NIKOYA S ,et al. Mediated ciphertext-policy attribute-based encryption and its application[A]. Proc of the 10th Int’l Workshop on Information Security Applications-WISA 2009[C]. LNCS 5932,Berlin,Heidelberg: Springer-Verlag, 2009. 310-322.
|
[10] |
YU S C , WANG C , REN K ,et al. Attribute based data sharing with attribute revocation[A]. Proc of the ASIAN ACM Conf on Computer and Communications Security(ASIACCS 2010)[C]. New York,ACM Press, 2010. 262-270.
|
[11] |
CHENG Y , WANG Z Y , MA J ,et al. Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage[J]. Journal of Zhejiang University-Science C, 2013,14(2): 85-97.
|
[12] |
HUR J , NOH D K . Attribute-based access control with efficient revocation in data outsourcing systems[J]. IEEE Transactions on Parallel and Distributed Systems, 2011,22(7): 1214-1221.
|
[13] |
XIE X X , MA H , LI J ,et al. An efficient ciphertext-policy attribute-based access control towards revocation in cloud computing[J]. Journal of Universal Computer Science, 2013,(16): 2349-2367.
|
[14] |
TAKERU N , MASAMI M , YOSHIAKI S . Provably secure attribute-based encryption with attribute revocation and grant function using proxy re-encryption and attribute key for updating[J]. Human-Centric Computing and Information Sciences, 2015,(8): 1-13.
|
[15] |
IBRAIMI L , TANG Q , HARTEL P ,et al. Efficient and provable secure ciphertext-policy attribute-based encryption schemes[A]. Proc of the Information Security Practice and Experience[C]. Berlin,Heidelberg: Springer-Verlag, 2009. 1-12.
|