[1] |
SAHAI A , WATERS B . Fuzzy identity-based encryption[A]. EUROCRYPT 2005[C]. Aarhus,Denmark, 2005. 457-473.
|
[2] |
KATZ J , SAHAI A , WATERS B . Predicate encryption supporting disjunctions,polynomial equations,and inner products[A]. EUROCRYPT2008[C]. Istanbul,Turkey, 2008. 146-162.
|
[3] |
MAJI H K , PRABHAKARAN M , ROSULEK M . Attribute-based signatures[A]. CT-RSA 2011[C]. San Francisco,CA,USA, 2011. 376-392.
|
[4] |
WANG H , XU Q , BAN T . A provably secure two-party attribute-based key agreement protocol[A]. IIH-MSP 2009[C]. Kyoto,Japan, 2009. 1042-1045.
|
[5] |
WANG H , XU Q , FU X . Two-party attribute-based key agreement protocol in the standard model[A]. ISIP 2009[C]. Cairo,Egypt, 2009. 325-328.
|
[6] |
YONEYAMA K . Strongly secure two-pass attribute-based authenticated key exchange[A]. Paring-based Cryptography 2010[C]. Yamanaka Hot Spring,Japan, 2010. 147-166.
|
[7] |
BIRKETT J , STEBILA D . Predicate-based key exchange[A]. ACISP 2010[C]. Sydney,Australia, 2010. 282-299.
|
[8] |
FUJIOKA A , SUZUKI K , YONEYAMA K . Predicate-based authenticated key exchange resilient to ephemeral key leakage[A]. WISA 2010[C]. Jeju Island,Korea, 2010. 15-30.
|
[9] |
PARK J H . Inner-product encryption under standard assumptions[J]. Designs,Codes and Cryptography, 2011,58: 235-257.
|
[10] |
LAMACCHIA B , LAUTER K , MITYAGIN A . Stronger security of authenticated key exchange[A]. ProvSec 2007[C]. Wollongong,Australia, 2007. 1-16.
|