[1] |
SAHAI A , WATERS B . Fuzzy identity-based encryption[A]. Cryptology-EUROCRYPT 2005[C]. Springer Berlin Heidelberg, 2005. 457-473.
|
[2] |
GOYAL V , PANDEY O , SAHAI A ,et al. Attribute-based encryption for fine-grained access control of encrypted data[A]. Proceedings of the 13th ACM Conference on Computer and Communications Security[C]. 2006. 89-98.
|
[3] |
OSTROVSKY R , SAHAI A , WATERS B . Attribute-based encryption with non-monotonic access structures[A]. Proceedings of the 14th ACM Conference on Computer and Communications Security[C]. 2007. 195-203.
|
[4] |
BETHENCOURT J , SAHAI A , WATERS B . Ciphertext-policy attribute-based encryption[A]. IEEE Symposium on Security and Privacy,2007[C]. 2007. 321-334.
|
[5] |
CHEUNG L , NEWPORT C . Provably secure ciphertext policy ABE[A]. Proceedings of the 14th ACM Conference on Computer and Communications Security[C]. 2007. 456-465.
|
[6] |
GOYAL V , JAIN A , PANDEY O ,et al. Bounded Ciphertext Policy Attribute Based Encryption[M]. Automata,Languages and Programming,Springer Berlin Heidelberg, 2008. 579-591.
|
[7] |
WATERS B . Ciphertext-policy Attribute-based Encryption:an Expressive,Efficient,and Provably Secure Realization[M]. Public Key Cryptography-PKC 2011,Springer Berlin Heidelberg, 2011. 53-70.
|
[8] |
ATTRAPADUNG N , LIBERT B , De PANAFIEU E . Expressive Key-Policy Attribute-based Encryption with Constant-size Ciphertexts[M]. Public Key Cryptography–PKC 2011,Springer Berlin Heidelberg, 2011. 90-108.
|
[9] |
ATTRAPADUNG N , HERRANZ J , LAGUILLAUMIE F ,et al. Attribute-based encryption schemes with constant-size ciphertexts[J]. Theoretical Computer Science, 2012,422: 15-38.
|
[10] |
HOHENBERGER S , WATERS B . Attribute-Based Encryption with Fast Decryption[M]. Public-Key Cryptography–PKC 2013,Springer Berlin Heidelberg, 2013. 162-179.
|
[11] |
CANETTI R , HALEVI S , KATZ J . A forward-secure public-key encryption scheme[A]. Cryptology—Eurocrypt 2003[C]. Springer Berlin Heidelberg, 2003. 255-271.
|
[12] |
OKAMOTO T , TAKASHIMA K . Fully secure functional encryption with general relations from the decisional linear assumption[A]. Cryptology–CRYPTO 2010[C]. Springer Berlin Heidelberg, 2010. 191-208.
|
[13] |
LEWKO A , OKAMOTO T , SAHAI A ,et al. Fully secure functional encryption:attribute-based encryption and (hierarchical) inner product encryption[A]. Cryptology–EUROCRYPT 2010[C]. Springer Berlin Heidelberg, 2010. 62-91.
|
[14] |
BONEH D , GOH E J , NISSIM K . Evaluating 2-DNF Formulas on Ciphertexts[M]. Theory of Cryptography. Springer Berlin Heidelberg, 2005. 325-341.
|
[15] |
BEIMEL A . Secure Schemes for Secret Sharing and Key Distribution[D]. PhD Thesis,Israel Institute of Technology,Technion,Haifa,Israel, 1996.
|