[1] |
SHAMIR A . Identity-based cryptosystems and signatures schemes[J]. Lecture Notes in Computer Science, 1985,196: 47-53.
|
[2] |
BONEH D , FRANKLIN M . Identity-based encryption from the weil pairing[J]. Lecture Notes in Computer Science, 2001,2139: 213-229.
|
[3] |
COCKS C . An identity based encryption scheme based on quadratic residues[A]. The 8th IMA International Conference on Cryptography and Coding[C]. Cirencester,UK, 2001. 360-363.
|
[4] |
SAHAI A , WATERS B . Fuzzy identity-based encryption[J]. Lecture Notes in Computer Science, 2005,3494: 457-473.
|
[5] |
GOYAL V , PANDEY O , SAHAI A ,et al. Attribute-based encryption for fine-grained access control of encrypted data[A]. The 13th ACM Conference on Computer and Communications Security ACM[C]. Alexandria,VA,USA, 2006. 89-98.
|
[6] |
OSTROVSKY R , SAHAI A , WATERS B . Attribute-based encryption with non-monotonic access structures[A]. The 14th ACM Conference on Computer and Communications Security ACM[C]. Alexandria,VA,USA, 2007. 195-203.
|
[7] |
BETHENCOURT J , SAHAI A , WATERS B . Ciphertext-policy attribute-based encryption[A]. IEEE Symposium on Security and Privacy[C]. Oakland,California,USA, 2007. 321-334.
|
[8] |
WATERS B . Ciphertext-policy attribute-based encryption:An expressive,efficient,and provably secure realization[EB/OL]. , 2008.
|
[9] |
ATTRAPADUNG N , IMAI H . Dual-policy attribute based encryption[A]. ACNS 2009[C]. France, 2009. 168-185.
|
[10] |
杨晓元, 蔡伟艺, 陈海滨 . 多主密钥功能加密:基于LMSSS的M-KP-ABE方案[J]. 计算机研究与发展, 2011,48(8): 1363-1369. YANG X Y , CAI W Y , CHEN H B . Multiple-authority key functional encryption:a M-KP-ABE scheme based on LMSSS[J]. Journal of Computer Research and Development, 2011,48(8): 1363-1369.
|
[11] |
KATZ J , SAHAI A , WATERS B . Predicate encryption supporting disjunctions,polynomial equations,and inner products[A]. Advances in Cryptology-EUROCRYPT 2008[C]. Istanbul,Turkey, 2008. 146-162.
|
[12] |
WATERS B . Dual system encryption:Realizing fully secure ibe and hibe under simple assumptions[A]. Advances in Cryptology CRYPTO 2009[C]. Santa Barbara,California,USA, 2009. 619-636.
|
[13] |
LEWKO A , OKAMOTO T , SAHAI A ,et al. Fully secure functional encryption:Attribute-based encryption and(hierarchical)inner product encryption[A]. Advances in Cryptology-EUROCRYPT 2010[C]. French, 2010. 62-91.
|
[14] |
FREEMAN D M . Converting pairing-based cryptosystems from composite-order groups to prime-order groups[A]. Advances in Cryptology-EUROCRYPT 2010[C]. French, 2010. 44-61.
|
[15] |
LEWKO A . Tools for simulating features of composite order bilinear groups in the prime order setting[EB/OL]. . 2011.
|
[16] |
Lewko A , Waters B . New techniques for dual system encryption and fully secure hibe with short ciphertexts[A]. TCC 2010[C]. Zurich,Switzerland, 2010. 455-479.
|
[17] |
BEIMEL A . Secure Schemes for Secret Sharing and Key Distribution[D]. Haifa:Israel Institute of Technology, 1996.
|