共 15 条
[1]
Sahai A., Waters B., Fuzzy identity-based encryption, Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 457-473, (2005)
[2]
Bethencourt J., Sahai A., Waters B., Ciphertext-policy attribute-based encryption, IEEE Symposium on Security and Privacy, pp. 321-334, (2007)
[3]
Li Y., Lei L., A multi-authorities access control scheme supporting revocation, Transactions of Beijing Institute of Technology, 37, 10, pp. 1014-1018, (2017)
[4]
Lewko A., Waters B., New techniques for dual system encryption and fully secure HIBE with short ciphertexts, 7 Th Theory of Cryptography Conference, pp. 455-479, (2010)
[5]
Sushmita R., Milos S., Amiya N., Decentralized access control with anonymous authentication of data stored in clouds, IEEE Transaction on Parallel and Distributed Systems, 25, 2, pp. 384-394, (2014)
[6]
Yu S., Wang C., Ren K., Et al., Attribute based data sharing with attribute revocation, Proceedings of the 5 Th ACM Symposium on Information, pp. 261-270, (2010)
[7]
Hur J., Noh D.K., Attribute-based access control with efficient revocation in data outsourcing systems, IEEE Transactions on Parallel and Distributed Systems, 22, 7, pp. 1214-1221, (2011)
[8]
Yang K., Jia X., Expressive, efficient, and revocable data access control for multi-authority cloud storage, IEEE Transactions on Parallel and Distributed Systems, 25, 7, pp. 1735-1744, (2014)
[9]
Yu S., Ren K., Lou W., Attribute-based content distribution with hidden policy, Secure Network Protocols, pp. 39-44, (2008)
[10]
Lewko A., Okamoto T., Sahai A., Et al., Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption, Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 62-91, (2010)