[1] |
BETHENCOURT J , SAHAI A , WATERS B . Ciphertext-policy attribute-based encryp-tion[C]// IEEE Symposium on Security and Privacy. 2007: 321-334.
|
[2] |
GOVALl V , PANDEY O , SAHAI A ,et al. Attribute-based encryption for fine-grained access control of encrypted data[C]// ACM Conference on Computer and Communications Security. 2006: 89-98.
|
[3] |
ATTRAPADUNG N , LIBERT B , PANAFIEU E . Expressive key-policy attribute-based encryption with constant-size cipher-texts[C]// International Conference on Practice and Theory in Public Key Cryptography. 2011: 90-108.
|
[4] |
ATTRAPADUNG N , IMAI H . Conjunctive broadcast and attribute-based encryp-tion[C]// Pairing-Based Cryptography-Pairing 2009. 2009: 248-265.
|
[5] |
ROY S , CHUAH M . Secure data retrieval based on ciphertext policy attribute-based encryption CP-ABE system for the DTNs[R]. Lehigh CSETech. 2009.
|
[6] |
ATTRAPADUNG N , HERRANZ J , LIBERT B ,et al. Attribute-based encryption schemes with constant size ciphertexts[J]. Theoretical Computer Science, 2012,422(3): 15-38.
|
[7] |
SAHAI A , WATERS B . Fuzzy identity-based encryption[M]. Advances in Cryptology EURO-CRYPT. 2005: 457-473.
|
[8] |
GOYAL V , JAIN A , PANDEY O ,et al. Bounded ciphertext policy attribute based encryption[M]. Automata,Languages and Programming. 2008: 579-591.
|
[9] |
BEIMEL A . Secure schemes for secret sharing and key distribution[J]. International Journal of Pure & Applied Mathematics, 1996.
|
[10] |
ATTRAPADUNG N , IMAI H . Attribute-based encryption supporting direct/indirect revoca-tion modes[C]// Ima International Conference on Cryptography and Coding. 2009: 278-300.
|
[11] |
PIRRETTI M , TRAYNOR P , MCDANIEL P ,et al. Secure attribute-based systems[C]// ACM Conference on Computer and Communications Security. 2006: 799-837.
|
[12] |
BETHENCOURT J , SAHAI A , WATERS B . Ciphertext-policy attribute-based encryption[C]// IEEE Symposium on Security and Privacy. 2007: 321-334.
|
[13] |
BOLDYREVA A , GOYAL V , KUNMAR V . Identity-based encryption with efficient re-vocation modes[C]// The ACM Conference on Computer and Communications Security. 2008: 417-426.
|
[14] |
OSTROVSKY R , SAHAI A , WATERS B . Attribute-based encryption with non-monotonic access structures[C]// CCS 07 ACM Conference on Computer & Commu-nications Security. 2007: 195-203.
|
[15] |
STADDON J , GOLLE P , RASMUSSEN P . A content-driven access control sys-tem[C]// Symposium on Identity and Trust on the Internet. 2008: 26-35.
|
[16] |
WANG P , FENG D , ZHANG L . Towards attribute revocation in key-policy attribute based encryption[C]// International Conference on Cryptology and Network Security. 2011: 272-291.
|
[17] |
苏金树, 曹丹, 王小峰 ,等. 属性基加密机制[J]. 软件学报, 2011,22(6): 1299-1315.
|
|
SU J S , CAO D , WANG X F ,et al. Attribute-based encryption schemes[J]. Journal of Software, 2011,22(6): 1299-1315
|
[18] |
闫玺玺, 孟慧 . 支持直接撤销的密文策略属性基加密方案[J]. 通信学报, 2016,37(5): 44-50.
|
|
YAN X X , MENG H . Ciphertext policy attribute-based encryption scheme supporting direct revocation[J]. Journal on Communications, 2016,37(5): 44-50.
|
[19] |
胡海英, 商威 . 一种可撤销的 KP-ABE 方案[J]. 计算机系统应用, 2013,22(9): 123-128.
|
|
HU H Y , SHANG W . A revocable KP-ABE scheme[J]. Computer Systems and Application, 2013,22(9): 123-128.
|
[20] |
SHI Y , ZHENG Q , LIU J ,et al. Directly revocable key-policy attribute-based encryption with verifiable ciphertext delegation[J]. Information Sciences, 2015,295: 221-231.
|
[21] |
王鹏翩, 冯登国, 张立武 . 一个基于访问树的支持用户撤销的KP-ABE方案[C]//. 中国计算机网络与信息安全学术会议. 2011.
|
|
WANG P P , FENG D G , ZHANG L W . A KP-ABE scheme supporting user revocation based on access tree[C]// China Computer Networks and Information Security Conference. 2011.
|
[22] |
林娟, 薛庆水, 曹珍富 . 基于代理的即时属性撤销KP-ABE方案[J]. 计算机工程, 2014,40(10): 20-24.
|
|
LING J , XUE Q X , CAO Z F . Proxy-based immediate attribute revocation KP-ABE Scheme[J]. Computer Engineering, 2014,40(10): 20-24.
|
[23] |
马海英, 曾国荪 . 可追踪并撤销叛徒的属性基加密方案[J]. 计算机学报, 2012,35(9): 1845-1855.
|
|
MA H Y , ZENG G S . An attribute-based en-cryption scheme for traitor tracing and revo-cation together[J]. Chinese Journal of Computers, 2012,35(9): 1845-1855.
|
[24] |
马海英, 曾国荪, 陈建平 ,等. 适应性安全的可追踪叛徒的基于属性加密方案[J]. 通信学报, 2016,37(1): 76-87.
|
|
MA H Y , ZENG G S , CHEN J P ,et al. Adaptively secure attribute-based encryption for traitor tracing[J]. Journal on Communications, 2016,37(1): 76-87.
|