[1] |
SAHAI A , WATERS B . Fuzzy identity-based encryption[A]. Cryptol-ogy-EUROCRYPT 2005[C]. Berlin: Springer-Verlag 2005.457-473.
|
[2] |
GOYAL V , PANDEY O , SAHAI A , et al. Attribute-based encryption for fine-grained access control of encrypted data[A]. Proceedings of the 13th ACM Conference on Computer and Communications Secu-rity[C]. New York: ACM, 2006.89-98.
|
[3] |
BETHENCOURT J , SAHAI A , WATERS B , et al. Ciphertext-policy attrib-ute-based encryption[A]. Proceedings of the 2007 IEEE Symposium on Security and Privacy[C]. Washington DC, 2007.321-334.
|
[4] |
WATERS B . Ciphertext-policy attribute-based encryption: an expres-sive, efficient, and provably secure realization[A]. PKC 2011[C]. Springer, Heidelberg, 2011.53-70.
|
[5] |
LI J , AU M H , SUSILO W , et al. Attribute-based signature and its applications[A]. ASIACCS 2010[C]. 2010.60-69.
|
[6] |
OKAMOTO T , TAKASHIMA K , et al. Efficient attribute-based signatures for non-monotone predicates in the standard model[A]. PKC 2011[C]. Springer, Heidelberg, 2011.35-52.
|
[7] |
WANG H , XU Q , BAN T . A provably secure two-party attribute-based key agreement protocol[A]. IIH-MSP 2009[C]. Springer, Heidelberg, 2009.1042-1045.
|
[8] |
WANG H , XU Q , FU X . Two-party attribute-based key agreement protocol in the standard model[A]. ISIP 2009[C]. Springer, Heidelberg, 2009.325-328.
|
[9] |
WANG H , XU Q , FU X . Revocable attribute-based key agreement protocol without random oracles[A]. JNW 4[C]. Springer, Heidelberg, 2009.787-794.
|
[10] |
YONEYAMA K . Strongly secure two-pass attribute-based authenti-cated key exchange[A]. Pairing 2010[C]. Springer, Heidelberg, 2010.147-166.
|
[11] |
BIRKETT J , STEBILA D . Predicate-based key exchange[A]. ACISP 2010[C]. Springer, Heidelberg, 2010.282-299.
|
[12] |
YONEYAMA K . Two-party round-optimal session-policy attrib-ute-based authenticated key exchange without random oracles[A]. ICISC 2011[C]. Springer, 2011.467-489.
|
[13] |
BONEH D , CANETTI R , HALEVI S , et al. Chosen-ciphertext secu-rity from identity-based encryption[J]. SIAM J Comput, 2007,36(5):1301-1328.
|
[14] |
苏金树, 曹丹, 王小峰 等. 属性基加密机制[J]. 软件学报 2011,22(6): 1299-1315. SU J S , CAO D , WANG X F , et al. Attribute based encryption schemes[J]. Journal of Software, 2011,22(6): 1299-1315.
|
[15] |
ATTRAPADUNG N , IMAI H . Attribute-based encryption supporting direct/indirect revocation modes[A]. Proc of the Cryptography and Coding 2009[C]. Berlin: Springer-Verlag, 2009. 278-300.
|
[16] |
ATTRAPADUNG N , IMAI H . Conjunctive broadcast and attrib-ute-based encryption[A]. Pairing-Based Cryptography-Pairing 2009[C]. Berlin: Springer-Verlag, 2009. 248-265.
|
[17] |
LAI J , DENG R H , LIU S , et al. Efficient CCA-secure PKE from identity-based techniques[A]. CT-RSA 2010, Springer, Heidelberg, 2010. 132-147.
|
[18] |
BEIMEL A . Secure Schemes for Secret Sharing and Key Distribu-tion[D]. Israel Institute of Technology, Technion, 1996.
|
[19] |
BONEH D , GENTRY C , WATERS B . Collusion resistant broadcast encryption with short ciphertexts and private keys[A]. CRYPTO 2005[C]. Springer, Heidelberg, 2005.258-275.
|