[1] |
SAHAI A , WATERS B . Fuzzy identity-based encryption[C]// Advances in Cryptology-EUROCRYPT. 2005: 457-473.
|
[2] |
AJTAI M , DWORK C . A public-key cryptosystem with worstcase/average-case equivalence[C]// ACM Symposium on Theory of Computing(STOC). 1997: 284-293.
|
[3] |
REGEV O , . On lattices,learning with errors,random linear codes,and cryptography[C]// The Symposium on Theory of Computing. 2005: 84-93.
|
[4] |
AGRAWAL S , BOYEN X , VAIKUNTANATHAN V ,et al. Functional encryption for threshold functions (or fuzzy IBE) from lattices[C]// International Conference on Practice and Theory in Public Key Cryptography. 2012: 280-297.
|
[5] |
BOYEN X , . Attribute-based functional encryption on lattices[C]// The 10th Theory of Cryptography Conference,Lecture Notes in Computer Science. 2013: 122-142.
|
[6] |
LIU X M , MA J F , XIONG J B ,et al. Threshold attribute-based encryption with attribute hierarchy for lattices in the standard model[J]. IET Information Security, 2014,8(4): 217-223.
|
[7] |
ZHAO J , GAO H Y , ZHANG J Q . Attribute-based encryption for circuits on lattices[J]. Tsinghua Science and Technology, 2014,45(5): 463-469.
|
[8] |
WANG Y T . Lattice ciphertext policy attribute-based encryption in the standard model[J]. International Journal of Network Security, 2014,16(6): 444-451.
|
[9] |
LYUBASHEVSKY V , PEIKERT C , REGEV O . On ideal lattices and learning with errors over rings[C]// Advances in CryptologyEUROCRYPT 2010,International Conference on the Theory and Applications of Cryptographic Techniques. 2010: 1-23.
|
[10] |
ZHU W L , YU J P , ZHANG P ,et al. Efficient attribute-based encryption from R-LWE[J]. Chinese Journal of Electronics, 2014,23(4): 778-782.
|
[11] |
TAN S F , SAMSUDIN A . Lattice ciphertext-policy attribute-based encryption from ring-LWE[C]// International Symposium on Technology Management and Emerging Technologies. 2015: 258-262.
|
[12] |
吴立强, 杨晓元, 韩益亮 . 基于理想格的高效模糊身份加密方案[J]. 计算机学报, 2015,38(4): 775-782.
|
|
WU L Q , YANG X Y , HAN Y L . An efficient FIBE scheme based on ideal lattices[J]. Chinese Journal of Computers, 2015,38(4): 775-782.
|
[13] |
孙泽栋, 祝跃飞, 顾纯祥 ,等. 基于 RLWE 的密钥策略属性加密体制[J]. 通信学报, 2016,37(Z1): 125-131.
|
|
SUN Z D , ZHU Y F , GU C X ,et al. RLWE-based key-policy ABE scheme[J]. Journal on Communications, 2016,37(Z1): 125-131.
|
[14] |
杨海斌 . 一种新的格上基于身份的分层加密方案[J]. 武汉大学学报(理学版), 2016,62(2): 155-160.
|
|
YANG H B . A new hierarchical identity-based encryption scheme based on lattices[J]. Journal of Wuhan University (Nature Science Edition), 2016,62(2): 155-160.
|
[15] |
闫玺玺, 刘媛, 李子臣 ,等. 云环境下理想格上的多机构属性基加密隐私保护方案[J]. 信息网络安全, 2017(8): 19-25.
|
|
YAN X X , LIU Y , LI Z C ,et al. A privacy-preserving multi-authority attribute encryption scheme on ideal lattices in the cloud environment[J]. Netinfo Security, 2017(8): 19-25.
|