[1] |
SAHAI A , WATERS B . Fuzzy identity-based encryption[C]//Advances in Cryptology-Eurocrypt 2005. 2005:457-473.
|
[2] |
OKAMOTO T , TAKASHIMA K . Efficient attribute-based signatures for non-monotone predicates in the standard model[J]. IEEE Transac-tions on Cloud Computing, 2014,2(4):409-421.
|
[3] |
CHEN T , LI J , HUANG X , et al. Secure outsourced attribute-based signatures[J]. IEEE Transactions on Parallel and Distributed Systems, 2014,25(12):3285-3294.
|
[4] |
WEI J , HUANG X , HU X , et al. Revocable threshold attribute-based signature against signing key exposure[C]//ISPEC 2015. 2015:316-330.
|
[5] |
WEI J , HU X , LIU W . Traceable attribute-based signcryption[J]. Secu-rity and Communication Networks, 2014,7(12):2302-2317.
|
[6] |
杨晓元, 林志强, 韩益亮 . 高效的模糊属性基签密方案[J]. 通信学报, 2013,34(Z1):8-13. YANG X Y , LIN Z Q , HAN Y L . Efficient fuzzy attribute-based sign-cryption scheme[J]. Journal on Communications, 2013,34(Z1):8-13.
|
[7] |
MAJI H , PRABHAKARAN M , ROSULEK M . Attribute-based sig-natures:achieving attribute-privacy and collusion-resistance[EB/OL]. , 2008.
|
[8] |
KUMAR S , AGRAWAL S , BALARAMAN S , et al. Attribute based signatures for bounded multi-level threshold circuits[C]//EuroPKI 2010. 2011:141-154.
|
[9] |
LI J , AU M , SUSILO W , XIE D , et al. Attribute-based signature and its applications[C]//The 5th ACM Symposium on Information,Computer and Communications Security-ASIACCS'10. New York, 2010:60-69.
|
[10] |
LI J , KIM K . Hidden attribute-based signatures without anonymity revocation[J]. Information Sciences, 2010,180(9):1681-1689.
|
[11] |
SHAHANDASHTI S , SAFAVI N . Threshold attribute-based signa-tures and their application to anonymous credential sys-tems[C]//Progress in Cryptology-AFRICACRYPT 2009. 2009:198-216.
|
[12] |
MAJI H , PRABHAKARAN M , ROSULEK M . Attribute-based signa-tures[C]//CT-RSA 2011. 2011:376-392.
|
[13] |
OKAMOTO T , TAKASHIMA K . Efficient attribute-based signatures for non-monotone predicates in the standard model[C]//Public Key Cryptography-PKC 2011. 2011:35-52.
|
[14] |
CAO D , WANG X , WANGT , SU J . An expressive attribute-based signature scheme without random oracles[C]//2011 International Con-ference on Computer Application and System Modeling (ICCASM2011). 2011:560-564.
|
[15] |
ESCALA A , HERRANZ J , MORILLO P . Revocable attribute-based signatures with adaptive security in the standard model[C]//Proceed-ings of the 4th International Conference on Progress in Cryptology in Africa (AFRICACRYPT'11). 2011:224-241.
|
[16] |
WEI J , LIU W , HU X . Forward-secure threshold attribute-based sig-nature scheme[J]. The Computer Journal, 2015,58(10):2492-2506.
|
[17] |
GHADAFI E . Stronger security notions for decentralized traceable attribute-based signatures and more efficient constructions[C]//CT-RSA 2015. 2015:391-409.
|
[18] |
马春光, 石岚, 周长利 , 等. 属性基门限签名方案及其安全性研究[J]. 电子学报, 2013,41(5):1012-1015. MA C G , SHI L , ZHOU C L , et al. Threshold attribute-based signature and its security[J]. Acta Electronic Sinica, 2013,41(5):1012-1015.
|
[19] |
CAO D , ZHAO B , WANG X , et al. Flexible multi-authority attrib-ute-based signature schemes for expressive policy[J]. Mobile Informa-tion Systems, 2012,8(3):255-274.
|