[1] |
SAHAI A , WATERS B . Fuzzy identity based encryption[C]// The EUROCRYPT. Aarhus,Denmark, c2005:457-473.
|
[2] |
GOYAL V , PANDEY O , SAHAI A , et al. Attribute-based encryption for fine-grained access control of encrypted data[C]// The 13th ACM Conference on Computer and Communication Security. Alexandria,Virginia,USA, c2006:89-98.
|
[3] |
HINEK M J , JIANG S , SAFAVI-NAINI R , et al. Attribute-based encryption with key cloning protection[EB/OL]. .
|
[4] |
马海英, 曾国荪 . 可追踪并撤销叛徒的属性基加密方案[J]. 计算机学报, 2012,35(9):1845-1855. MA H Y , ZENG G S . An attribute-based encryption scheme for traitor tracing and revocation together[J]. Chinese Journal of Computers, 2012,35(9):1845-1855.
|
[5] |
WANG Y T , CHEN K F , CHEN J H . Attribute-based traitor tracing[J]. Journal of Information Science and Engineering, 2011,27(1): 181-195.
|
[6] |
LI J , REN K , KIM K . A2BE: accountable attribute-based encryption for abuse free access control[EB/OL]. .
|
[7] |
YU S C , REN K , LOU W J , et al. Defending against key abuse attacks in KP-ABE enabled broadcast system[C]// The Security and Privacy in Communication Networks. Athens,Greece, c2009:311-329.
|
[8] |
BONEH D , SHAW J . Collusion-secure fingerprinting for digital da-ta[C]// The CRYPTO'95. Santa Barbara, California, USA, c1995:452-465.
|
[9] |
ABDALLA M , DENT A W , MALONE-LEE J , et al. Identity-based traitor tracing[C]// The public Key Cryptography. Beijing, China, c2007:298-314.
|
[10] |
LIU Z , CAO Z , WONG D S . Blackbox traceable CP-ABE: how to catch people leaking their keys by selling decryption ices on eBay[C]// The 20th Conference on Computer and Communication Se-curity. Berlin,Germany, c2013:475-486.
|
[11] |
LEWKO A , OKAMOTO T , SAHAI A , et al. Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption[C]// The EUROCRYPT. c2010:62-91.
|
[12] |
WATERS B . Dual system encryption: realizing fully secure ibe and hibe under simple assumptions[C]// The CRYPTO'09. Santa Barbara, California,USA, c2009:619-636.
|
[13] |
GREEN M , AKINYELE A , RUSHANAN M . Libfenc: The Functional Encryption Library[EB/OL]. .
|