[1] |
SAHAIA , WATERS B . Fuzzy identity based encryption[A]. Proc of the Eurocrypt 2005[C]. Heidelberg: Springer-Verlag, 2005. 457-473.
|
[2] |
GOYAL V , PANDEY O , et al. Attribute-based encryption for fine-grained access control of encrypted data[A]. Proc of the 13th ACM CCS[C]. New York, 2006. 89-98.
|
[3] |
WATERS B . Ciphertext-policy attribute based encryption: an expres-sive, efficient and provably secure realization[A]. Proc of the PKC 2011[C]. Heidelberg: Springer-Verlag, 2011. 53-70.
|
[4] |
CHASE M . Multi-authority attribute based encryption[A]. Proc of the TCC 2007[C]. Heidelberg: Springer-Verlag, 2007. 515-534.
|
[5] |
CHASE M , CHOW S . Improving privacy and security in multi-authority attribute-based encryption[A]. Proc of the 16th ACMCCS[C]. New York, 2009. 121-130.
|
[6] |
LEWKO A , WATERS B . Decentralizing attribute-based encryption[A]. Proc of the Eurocrypt 2011[C]. Heidelberg: Springer-Verlag, 2011. 568-588.
|
[7] |
LEWKO A , WATERS B . DNew proof methods for attribute-based en-cryption: achieving full security through selective techniques[A]. Proc of the Crypto 2012[C]. Heidelberg: Springer-Verlag, 2012. 180-198.
|
[8] |
HOHENBERGER S , et al. Attribute based encryption: with fast de-cryption[A]. Proc of the PKC 2013[C]. Heidelberg: Springer-Verlag, 2013. 162-179.
|
[9] |
ANDERSON M . Two Remarks on Public Key Cryptology[R]. Invited Lecture at the 4th ACM Conference on Computer and Communica-tions Security 1997.
|
[10] |
BELLARE M , MINER S K . A forward-secure digital signature scheme[A]. Proc of the Crypto 1999[C]. Heidelberg: Springer-Verlag, 1999. 431-448.
|
[11] |
ABDALLA M , REYZIN L . A new forward-secure digital signature scheme[A]. Proc of the Asiacrypt 2000[C]. Heidelberg: Springer-Verlag, 2000. 116-129.
|
[12] |
KOZLOV A , REYZIN L . Forward-secure signatures with fast key update[A]. Proc of the SCN 2002[C]. Heidelberg: Springer-Verlag, 2002. 247-262.
|
[13] |
BOYEN X , SHACHAM H , SHEN E , et al. Forward-secure signatures with untrusted update[A]. Proc of 13th ACM CCS[C]. New York, USA 2006. 191-200.
|
[14] |
LIBERT B , QUISQUATER J , YUNG M . Forward-secure signatures in untrusted update environments[A]. Proc of the 14th ACM Conference on Computer and Communications Security[C]. New York, USA 2007. 266-275.
|
[15] |
GENTRY C , SILVERBERG A . Hierarchical ID-based cryptogra-phy[A]. Proc of the Asiacrypt 2002[C]. Heidelberg:Springer-Verlag, 2002. 548-566.
|
[16] |
CANETTI R , HALEVI S , KATZ J . A forward-secure public-key encryption scheme[A]. Proc of the Eurocrypt 2003[C]. Heidelberg:Springer-Verlag, 2003. 255-271.
|
[17] |
CANETTI R , HALEVI S , KATZ J . A forward-secure public-key encryption scheme[J]. Journal of Cryptology, 2007,20:265-294.
|
[18] |
YAO D , FAZIO N , DODIS Y , et al. ID-based encryption for complex hierarchies with applications to forward security and broadcast en-cryption[A]. Proc of the 11th ACM CCS[C]. New York, USA 2004. 354-363.
|
[19] |
YU J , KONG F Y , CHENG X G , et al. Forward-secure iden-tity-basedpublic-key encryption without random oracles[J]. Funda-menta Informaticae, 2011,111(2):241-256.
|
[20] |
LU Y , LI J G . Forward-secure certificate-based encryption and its-generic construction[J]. Journal of Networks, 2010,5(5):527-534.
|
[21] |
BEIMEL A . Secure schemes for secret sharing and key distribution[D]. Israel Institute of Technology, Technion 1996.
|