[13] |
RIVEST R L , SHAMIR A , TAUMAN Y . How to leak a secret[A]. Proc of the Asiacrypt 2001[C]. Heidelberg: Springer-Verlag, 2001. 552-565.
|
[14] |
CHAUM D , HEYST E V . Group signatures[A]. Proc of the Eurocrypt 1991[C]. Heidelberg: Springer-Verlag, 1991. 257-265.
|
[15] |
LI J , KIM K . Hidden attribute-based signatures without anonymity revocation[J]. Information Sciences, 2010,180: 1681-1689.
|
[16] |
SHAHANDASHTI S F,SAFAVI-NAINI R . Threshold attribute-based signatures and their application to anonymous credential systems[A]. Proc of the Africacrypt 2009[C]. Heidelberg: Springer-Verlag, 2009. 198-216.
|
[17] |
LI J , AU M H , SUSILO W ,et al. Attribute-based signatures and its applications[A]. Proc of the 5th ACM ASIACCS[C]. 2010. 978-987.
|
[18] |
WANG W Q , CHEN S Z . An Efficient attribute-based ring signature scheme[A]. Proc of the 2009 International Forum on Computer Science-Technology and Applications[C]. 2009. 147-150.
|
[19] |
WANG W Q , CHEN S Z . Attribute-based ring signature scheme with constant-size signature[J]. IET Information Security, 2010,4(2): 104-110.
|
[20] |
TOLUEE R , ASAAR M R , SALMASIZADEH M . Attribute-based ring signatures:security analysis and a new construction[A]. Proc of the 10th ISCISC[C]. 2013. 1-6.
|
[21] |
付小晶, 张国印, 马春光 . 一个改进的动态门限基于属性签名方案[J]. 计算机科学, 2013,40(7): 93-97. FU X J , ZHANG G Y , MA C G . Dynamic threshold attributes-based signature scheme[J]. Computer Science, 2013,40(7): 93-97.
|
[22] |
张秋璞, 徐震, 叶顶峰 . 一个可追踪身份的基于属性签名方案[J]. 软件学报, 2012,23(9): 2449-2464. ZHANG Q P , XU Z , YE D F . Identity traceable attribute-based signa-ture scheme[J]. Journal of Software, 2012,23(9): 2449-2464.
|
[23] |
ESCALA A , HERRANZ J , MORILLO P . Revocable attribute-based signatures with adaptive security in the standard model[A]. Proc of the Africacrypt 2011[C]. Heidelberg: Springer-Verlag, 2011. 224-241.
|
[24] |
陈少真, 王文强, 彭书娟 . 高效的基于属性的环签名方案[J]. 计算机研究与发展, 2010,47(12): 2075-2082. CHEN S Z , WANG W Q , PENG S J . Efficient attribute-based ring signature schemes[J]. Journal of Computer Research and Development, 2010,47(12): 2075-2082.
|
[1] |
SHAMIR A . Identity-based cryptosystems and signatures schemes[A]. Proc of the CRYPTO 1984[C]. Heidelberg: Springer-Verlag, 1985. 47-53.
|
[2] |
SAHAI A , WATERS B . Fuzzy identity-based encryption[A]. Proc of the Eurocrypt 2005[C]. Heidelberg: Springer-Verlag, 2005. 457-473.
|
[3] |
GOYAL V , PANDEY O , et al . Attribute-based encryption for fine-grained access control of encryption data[A]. Proc of the 13th ACM CCS[C]. New York, 2006. 89-98.
|
[4] |
ATTRAPADUNG N , IMAI H . Dual-policy attribute based encryption[A]. Proc of the ACNS’09[C]. Heidelberg: Springer-Verlag, 2009. 168-185.
|
[5] |
李强, 冯登国, 张立武 ,等. 标准模型下增强的基于属性的认证密钥协商协议[J]. 计算机学报, 2013,36(10): 2156-2167. LI Q , FENG D G , ZHANG L W ,et al. Enhanced attribute-based au-thenticated key agreement protocol in the standard model[J]. Chinese Journal of Computers, 2013,36(10): 2156-2167.
|
[6] |
熊金波, 姚志强, 马建峰 ,等. 基于属性加密的组合文档安全自毁方案[J]. 电子学报, 2014,42(2): 366-376. XIONG J B , YAO Z Q , MA J F ,et al. A secure self-destruction scheme for composite documents with attribute based encryption[J]. Acta Electronica Sinica, 2014,42(2): 366-376.
|
[7] |
魏江宏, 刘文芬, 胡学先 . 前向安全的密文策略基于属性加密方案[J]. 通信学报, 2014,35(7): 38-45. WEI J H , LIU W F , HU X X . Forward-secure ciphertext-policy attrib-ute-based encryption scheme[J]. Journal on Communications, 2014,35(7): 38-45.
|
[8] |
YANG P , CAO Z , Dong X . Fuzzy identity based signature with applications to biometric authentication[J]. Compute and Electrical Engineering, 2011,(37): 532-540.
|
[9] |
KHADER D . Attribute based group signatures[EB/OL]. . 2007.
|
[10] |
KHADER D . Attribute based group signature with revocation[EB/OL]. .
|
[11] |
GUO S , ZENG Y . Attribute-based signature scheme[A]. Proc of the ISA 2008[C]. Busan, 2008. 509-511.
|
[12] |
MAJI H , PRABHAKARAN M , ROSULEK M . Attribute-based signatures[A]. Proc of the CT-RSA 2011[C]. Heidelberg: Springer-Verlag, 2011. 376-392.
|