[1] |
SAHAI A , WATERS B . Fuzzy identity based encryption[A]. Proc of the EUROCRYPT[C]. Aarhus, Denmark, 2005. 457-473.
|
[2] |
GOYAL V , PANDEY O , SAHAI A , et al. Attribute-based encryption for fine-grained access control of encrypted data[A]. Proc of the 13th ACM Conference on Computer and Communication Security[C]. Alexandria, Virginia, USA, 2006. 89-98.
|
[3] |
BETHENCOURT J , SAHAI A , WATERS B . Ciphertext-policy attrib-ute-based encryption[A]. Proc of the 2007 IEEE Symposium on Secu-rity and Privacy[C]. Oakland, California, USA, 2007. 321-334.
|
[4] |
ATTRAPADUNG N , IMAI H . Dual-Policy attribute based encryp-tion[A]. Applied Cryptography and Network Security[C]. Paris, France, 2009. 168-185.
|
[5] |
CHEUNG L , NEWPORT C . Provably secure ciphertext policy ABE[A]. Computer and Communications Security[C]. New York, USA, 2007. 456-465.
|
[6] |
OKAMOTO T , SAHAI A , WATERS B . Attribute-based encryption with non-monotonic access structures[A]. Proc of the 14th ACM Con-ference on Computer and Communication Security[C]. New York, USA, 2007. 195-203.
|
[7] |
王鹏翩, 冯登国, 张立武 . 一种支持完全细粒度属性撤销的CP-ABE方案[J]. 软件学报, 2012,23(10):2805-2816. WANG P P , FENG D G , ZHANG L W . CP-ABE scheme supporting fully fine-grained attribute revocation[J]. Chinese Journal of Software, 2012,23(10):2805-2816.
|
[8] |
ATTRAPADUNG N , IMAI H , Conjunctive broadcast and attrib-ute-based encryption[A]. Proc of the Pairing-Based Cyptography-Pairing 2009[C]. Palo Alto,USA, 2009. 248-265.
|
[9] |
马海英, 曾国荪 . 可追踪并撤销叛徒的属性基加密方案[J]. 计算机学报, 2012,35(9):1845-1855. MA H Y , ZENG G S . An attribute-based encryption scheme for traitor tracing and revocation together[J]. Chinese Journal of Computers, 2012,35(9):1845-1855.
|
[10] |
WANG Y T , CHEN K F , CHEN J H . Attribute-based traitor tracing[J]. Journal of Information Science and Engineering, 2011,27(1):181-195.
|
[11] |
YU S C , REN K , LOU W J , LI J . Defending against key abuse attacks in KP-ABE enabled broadcast system[A]. Pro of the Security and Pri-vacy in Communication Networks[C]. Athens, Greece, 2009. 311-329.
|
[12] |
LI J , REN K , ZHU B , et al. Privacy-aware attribute-based encryp-tion with user accountability[J]. Information Security, 2009,5735:347-362.
|
[13] |
WANG Y T , CHEN K F , LONG Y . Toward accountable authority attrib-ute-based encryption[J]. High Technology Letters, 2013,19(1):82-87.
|
[14] |
BOZOVIC V , SOCEK D , STEINWANDT R , et al. Multi-authority attribute based encryption with honest-but-curious central authority[J]. International Journal of Computer mathematics, 2012,89(1/3):268-283.
|
[15] |
LEWKO A , WATERS B . Decentralizing attribute-based encryp-tion[EB/OL]. , http://eprint.iacr.org/2010/351, 2010.
|
[16] |
LIN H , CAO Z F , LIANG X H , et al. Secure threshold multi-authority attribute based encryption without a central authorit[J]. Progress in Cryptology INDOCRYPT, 2008,5365:426-436.
|
[17] |
YU S S , REN K , LOU W J . FDAC: toward fine-grained distributed data access control in wireless sensor networks[A]. IEEE INFOCOM 2009[C]. Rio de Janeiro, Brazil, 2009. 963-971.
|
[18] |
洪澄, 张敏, 冯登国 . 面向云存储的高效动态密文访问控制方法[J]. 通信学报, 2011,32(7):125-132. HONG C , ZHANG M , FENG D G . Achieving efficient dynamic cryp-tographic access control in cloud storage[J]. Chinese Journal of Com-munications, 2011,32(7):125-132.
|
[19] |
HUR J . Fine-grained data access control for distributed sensor net-works[J]. Wireless Network, 2011,17(4):1235-1249.
|
[20] |
祁正华, 杨庚, 任勋益, 王卉 . 基于ABE-IBS的无线传感网签名加密一体化方法[J]. 通信学报, 2010,31(4):37-44. QI Z H , YANG G , REN X Y , et al. ABE-IBS based signature- encryp-tion method for WSN[J]. Journal on Communications, 2010,31(4):37-44.
|
[21] |
EVEN S , GOLDREICH O , MACALI S . Online/offline digital signa-tures[A]. Proc of Advances in Cryptology[C]. Santa Barbara, Califor-nia, USA, 1989. 263-275.
|
[22] |
GUO F C , MU Y , CHEN Z D . Identity-based online/offline encryp-tion[A]. Proc of Financial Cryptography and Data Security 2008[C]. Cozumel, Mexico, 2008. 247-261.
|
[23] |
CHOW S SM , LIU J K , ZHOU J Y . Identity-based online/offline key encapsulation and encryption[A]. Proc of ASIACCS'11[C]. Hong Kong, China, 2011. 52-60.
|
[24] |
SAKAI R , KASAHARA M . ID based cryptosystems with pairing on elliptic curve[EB/OL]. , http://eprint.iacr.org/2003/54, 2003.
|