[1] |
SAHAI A , WATERS B . Fuzzy identity-based encryption[C]// Advances in Cryptology-Eurocrypt 2005,Springer. 2005: 457-473.
|
[2] |
GOYAL V , PANDEY O , SAHAI A , WATERS B . Attribute-based encryption for fine-grained access control of encrypted data[C]// The 13th ACM Conference on Computer and Communications Security. 2006: 89-98.
|
[3] |
HOHENBERGER S , WATERS B . Attribute-based encryption with fast decryption[C]// Public-Key Cryptography-PKC 2013. 2013: 162-179.
|
[4] |
WATERS B , . Ciphertext-policy attribute-based encryption:an expressive,efficient,and provably secure realization[C]// Public Key Cryptography-PKC 2011. 2011: 53-70.
|
[5] |
GREEN M , HOHENBERGER S , WATERS B . Outsourcing the decryption of ABE ciphertexts[C]// USENIX Security Symposium. 2011.
|
[6] |
LAI J , DENG R H , GUAN C , WENG J . Attribute-based encryption with verifiable outsourced decryption[J]. IEEE Transactions on Information Forensics and Security, 2013,8(8): 1343-1354.
|
[7] |
LIN S , ZHANG R , MA H , WANG M . Revisiting attribute-based encryption with verifiable outsourced decryption[J]. IEEE Transactions on Information Forensics and Security, 2015,10(10): 2119-2130.
|
[8] |
MAO X , LAI J , MEI Q , CHEN K ,et al. Generic and efficient constructions of attribute-based encryption with verifiable outsourced decryption[J]. IEEE Transactions on Dependable and Secure Computing, 2016(1).
|
[9] |
MA H , ZHANG R , WAN Z ,et al. Verifiable and exculpable outsourced attribute-based encryption for access control in cloud computing[J]. IEEE Transactions on Dependable and Secure Computing, 2017,14(6): 679-692.
|
[10] |
LIANG X , CAO Z , LIN H ,et al. Attribute based proxy re-encryption with delegating capabilities[C]// The 4th International Symposium on Information,Computer,and Communications Security. 2009: 276-286.
|
[11] |
LUO S , HU J , CHEN Z . Ciphertext policy attribute-based proxy re-encryption[C]// The 12th Information and Communications Security(ICICS 2010). 2010: 401-415.
|
[12] |
LIANG K , SUSILO W . Searchable attribute-based mechanism with efficient data sharing for secure cloud storage[J]. IEEE Transactions on Information Forensics and Security, 2015,10(9): 1981-1992.
|
[13] |
SHAO J , LU R , LIN X . Fine-grained data sharing in cloud computing for mobile devices[C]// 2015 IEEE Conference on Computer Communications (INFOCOM). 2015: 2677-2685.
|