[1] |
SAHAI A , WATERS B . Fuzzy identity-based encryption[C]// Ad-vances in Cryptology -EUROCRYPT 2005. Berlin c2005: 457-473.
|
[2] |
GOYAL V , PANDEY O , SAHAI A , et al. Attribute-based encryption for fine-grained access control of encrypted data[C]// The 13th ACM Conference on Computer and Communications Security. New York, c2006: 89-98.
|
[3] |
PIRRETTI M , TRAYNOR P , MCDANIEL P , et al . Secure attribute-based systems[C]// The ACM Conf on Computer and Com-munications Security. New York, c2006: 99-111.
|
[4] |
BETHENCOURT J , SAHAI A , WATERS B . Ciphertext-policy attribute-based encryption[C]// The 2007 IEEE Symp on Security and Privacy. Washington c2007: 322-334.
|
[5] |
BOLDYREVA A , GOYAL V , KUMAR V . Identity-based encryption with efficient revocation[C]// The ACM Conf on Computer and Com-munications Security. New York, c2008: 417-426.
|
[6] |
IBRAIMI L , PETKOVIC M , NIKOYA S , et al. Mediated cipher-text-policy attribute-based encryption and its application[C]// The 10th Int'l Workshop on Information Security Applications-WISA. Berlin, c2009: 310-322.
|
[7] |
YU S C , WANG C , REN K , et al. Attribute based data sharing with attribute revocation[C]// The ASIAN ACM Conf on Computer and Com-munications Security(ASIACCS 2010). New York, c2010: 262-270.
|
[8] |
CHENG Y , WANG Z Y , MA J , et al. Efficient revocation i cipher-text-policy attribute-based encryption based cryptographic cloud sto-rage[J]. Journal of Zhejiang University-Science, 2013,14(2): 85-97.
|
[9] |
HUR J , NOH D K . Attribute-based access control with efficient revo-cation in data outsourcing systems[J]. IEEE Transactions on Parallel and Distributed Systems, 2011,122(7): 1214-1221.
|
[10] |
XIE X X , MA H , LI J , et al. An efficient ciphertext-policy attribute-based access control towards revocation in cloud computing[J]. Journal of Universal Computer Science, 2013,119(16): 2349-2367.
|
[11] |
OSTROVSKY R , SAHAI A , WATERS B . Attribute-based encryption with non-monotonic access structures[C]// The ACM Conf on Com-puter and Communications Security. New York, c2007: 195-203.
|
[12] |
ATTAPADUNG N , IMAI H . Conjunctive broadcast and attribute-based encryption[C]// The Pairing-Based Cryptography-Pairing 2009. Berlin c20079: 248-265.
|
[13] |
王鹏翩, 冯登国, 张立武 . 一种支持完全细粒度属性撤销的CP-ABE方案软件学报[J]. 软件学报, 2012,23(10): 2805-2816. WANG P P , FENG D G , ZHANG L W . CP-ABE scheme supporting fully fine-grained attribute revocation[J]. Journal of Software, 2012,23(10): 2805-2816.
|
[14] |
WU Q X . A generic construction of ciphertext-policy attribute-based encryption supporting attribute revocation[J]. China Communica-tions, 2014,111(1): 93-100.
|
[15] |
LIU Z , CAO Z F . On efficiently transferring the linear secret-sharing schemes matrix in ciphertext-policy attribute-based encryption[EB/OL]. , 2010.
|
[16] |
LIU Z , CAO Z F . Efficient generation of linear secret haring scheme matrices from threshold access trees[C]// Cryptology ePrint Archive:Listing. c2010.
|
[17] |
LEWKO A , SAHAI A , WATERS B . Revocation systems with very small private keys[C]// IEEE Symposium on Security and Privacy(SP). Oakland,USA, c2010: 273-285.
|
[18] |
IBRAIMI L , TANG Q , HARTEL P , et al. Efficient and provable secure ciphertext-policy attribute-based encryption schemes[C]// The Infor-mation Security Practice and Experience. Berlin, c2009: 1-12.
|