共 18 条
[1]
Agrawal Shweta., Cryptology ePrint Archive
[2]
Ciphertext-policy attribute-based encryption
[J].
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2007,
:321-+
[3]
Boneh D, 2013, LECT NOTES COMPUT SC, V8043, P461, DOI 10.1007/978-3-642-40084-1_26
[4]
Boneh D, 2013, LECT NOTES COMPUT SC, V8269, P255, DOI 10.1007/978-3-642-42033-7_14
[6]
Functional Encryption for Inner Product with Full Function Privacy
[J].
PUBLIC-KEY CRYPTOGRAPHY - PKC 2016, PT I,
2016, 9614
:164-195
[7]
Goyal V., 2006, Proceedings of the 13th ACM Conference on Computer and Communications Security, P89, DOI DOI 10.1145/1180405.1180418
[9]
Kaiqing Huang, 2020, 2020 12th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA). Proceedings, P563, DOI 10.1109/ICMTMA50254.2020.00126