[1] |
YU S , WANG C , REN K ,et al. Achieving secure,scalable,and fine-grained data access control in cloud computing[A]. INFOCOM,2010 Proceedings IEEE[C]. 2010. 1-9.
|
[2] |
SAHAI A , WATERS B . Fuzzy Identity-Based Encryption[M]. Springer Berlin Heidelberg, 2005.
|
[3] |
GOYAL V , PANDEY O , SAHAI A ,et al. Attribute-based encryption for fine-grained access control of encrypted data[A]. Proceedings of the 13th ACM Conference on Computer and Communications Security[C]. ACM, 2006. 89-98.
|
[4] |
BETHENCOURT J , SAHAI A , WATERS B . Ciphertext-policy attribute-based encryption[A]. Security and Privacy[C]. 2007. 321-334.
|
[5] |
WATERS B . Ciphertext-Policy Attribute-Based Encryption:An Expressive,Efficient,and Provably Secure Realization[M]. Springer Berlin Heidelberg, 2011.
|
[6] |
CHASE M . Multi-Authority Attribute based Encryption[M]. Theory of Cryptography. Springer Berlin Heidelberg, 2007.
|
[7] |
LEWKO A , WATERS B . Decentralizing Attribute-based Encryption[M]. Springer Berlin Heidelberg, 2011.
|
[8] |
LIU Z , CAO Z , HUANG Q ,et al. Fully secure multi-authority ciphertext-policy attribute-based encryption without random oracles[A]. Computer Security–ESORICS 2011[C]. Springer Berlin Heidelberg, 2011. 278-297.
|
[9] |
SAHAI A , SEYALIOGLU H , WATERS B . Dynamic credentials and ciphertext delegation for attribute-based encryption[A]. Advances in Cryptology–CRYPTO 2012[C]. Springer Berlin Heidelberg, 2012. 199-217.
|
[10] |
YANG K , JIA X , REN K ,et al. Enabling efficient access control with dynamic policy updating for big data in the cloud[A]. INFOCOM,2014 Proceedings IEEE[C]. 2014. 2013-2021.
|
[11] |
NISHIDE T , YONEYAMA K , OHTA K . Attribute-based encryption with partially hidden encryptor-specified access structures[A]. Applied cryptography and network security[C]. Springer Berlin Heidelberg, 2008. 111-129.
|
[12] |
LI J , REN K , ZHU B ,et al. Privacy-aware attribute-based encryption with user accountability[A]. Information Security[C]. Springer Berlin Heidelberg, 2009. 347-362.
|
[13] |
LAI J , DENG R H , LI Y . Expressive CP-ABE with partially hidden access structures[A]. Proceedings of the 7th ACM Symposium on Information,Computer and Communications Security[C]. ACM, 2012. 18-19.
|
[14] |
BEIMEL A . Secure Schemes for Secret Sharing and Key Distribution[D]. Technion-Israel Institute of Technology,Faculty of Computer Science, 1996.
|
[15] |
BONEH D , GOH E J , NISSIM K . Evaluating 2-DNF formulas on ciphertexts[A]. Theory of Cryptography[C]. Springer Berlin Heidelberg, 2005. 325-341.
|
[16] |
LEWKO A , OKAMOTO T , SAHAI A ,et al. Fully secure functional encryption:attribute-based encryption and (hierarchical) inner product encryption[A]. Advances in Cryptology–EUROCRYPT 2010[C]. Springer Berlin Heidelberg, 2010. 62-91.
|
[17] |
DE CARO A , IOVINO V , PERSIANO G . Fully secure anonymous hibe and secret-key anonymousibe with short ciphertexts[A]. Pairing-Based Cryptography-Pairing 2010[C]. Springer Berlin Heidelberg, 2010. 347-366.
|
[18] |
LEWKO A , WATERS B . New techniques for dual system encryption and fully secure HIBE with short ciphertexts[A]. Theory of Cryptography[C]. Springer Berlin Heidelberg, 2010. 455-479.
|
[19] |
WATERS B . Dual system encryption:realizing fully secure IBE and HIBE under simple assumptions[A]. Advances in Cryptology-CRYPTO 2009[C]. Springer Berlin Heidelberg, 2009. 619-636.
|