[1] |
WINSBOROUGH W , SEAMONS K , JONES V . Automated trust negotiation[A]. Proceedings of DARPA Information Survivability Conference and Exposition[C]. ACM Press. 2000. 156-182.
|
[2] |
WINSBOROUGH W H . J J:Automated trust negotiation in attribute-based access control[A]. DARPA Information Survivability Conference and Exposition[C]. 2003. 252-257.
|
[3] |
LI N H , WINSBOROUGH W H , Mitchell JC . Distributed credential chain discovery in trust management[A]. Proc of the 8th ACM Conf on Computer and Communications Security[C]. New York: ACM Press, 2001. 156-165.
|
[4] |
HOLT J E , BRADSHAW R , SEAMONS K E ,et al. Hidden credentials[A]. Proceedings of 2nd ACM Workshop on Privacy in the Electronic Society[C]. ACM Press, 2003. 1-8.
|
[5] |
BONEH D , FRANKLIN M . Identity based encryption from we l pairing[A]. Kilian J CRYPTO 2001[C]. Berin:Springer-Verlag, 2001. 213-229.
|
[6] |
BRADSHAW R W , Holt J E , SEAMONS KE . Concealing complex policies with hidden credentials[A]. ACM Conf on Computer and Communications Security[C]. New York:ACM, 2004. 146-157.
|
[7] |
FRIKKEN K , ATALLAH M , LI JT . Hidden access control policies with hidden credentials[A]. ACM Workshop on Privacy in the Electronic Society[C]. New York: ACM Press, 2004. 27-28.
|
[8] |
SAHAI A , WATERS B . Fuzzy identity based encryption[A]. Advances in Cryptology-Eurocrypt,volume 3494 of LNCS[C]. Springer, 2005. 457-473.
|
[9] |
GOYAL V , PANDEY O , SAHAI A , Waters B . Attribute-based encryption for fine-grained access control of encrypted data[A]. Proc of the 13th ACM Conf on Computer and Communications Security[C]. New York: ACM Press, 2006. 89-98.
|
[10] |
YU S C , REN K , LOU W J . Attribute-Based content distribution with hidden policy[A]. Proc of the 4th Workshop on Secure Network Protocols (NPSec)[C]. Orlando:IEEE Computer Society, 2008. 39-44.
|
[11] |
TRAYNOR P , BUTLER K , ENCK W , MCDANIEL P . Realizing massive-scale conditional access systems through attribute-based cryptosystems[A]. Proc of the 15th Annual Network and Distributed System Security Symp[C]. San Diego:USENIX Association, 2008. 1-13.
|
[12] |
CHEUNG L , NEWPORT C . Provably secure ciphertext policy ABE[A]. Proc of the ACM Conf on Computer and Communications Security[C]. New York: ACM Press, 2007. 456-465.
|
[13] |
CHEUNG L , COOLEY J A , KHAZAN R , NEWPORT C ,et al. Collusion-resistant group key management using attribute-based encryption[EB/OL]. .
|
[14] |
YU S C , REN K , LOU W J . Attribute-based on-demand multicast group setup with membership anonymity[J]. Computer Networks, 2010,54(3): 377-386.
|
[15] |
NISHIDE T , YONEYAMA K , OHTA K . Attribute-basedencryption with partially hidden encryptor-specified access structures[A]. ACNS[C]. 2008. 111-129.
|
[16] |
LAI J , DENG R H , LI Y . Fully secure cipertext-policy hiding CP-ABE[A]. ISPEC 2011[C]. 2011. 24-39.
|
[17] |
CHASE M . Multi-authority attribute based encryption[A]. TCC,volume 4392 of LNCS[C]. Springer, 2007. 515-534.
|
[18] |
CHASE M , CHOW S . Improving privacy and security in multi-authority attribute-based encryption[A]. CCS ’09:Proceedings of the 16th ACM conference on Computer and communications security[C]. ACM,New York,NY,USA, 2009. 121-130.
|