共 34 条
[1]
FAME: Fast Attribute-based Message Encryption
[J].
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2017,
:665-682
[3]
Match Me if You Can: Matchmaking Encryption and Its Applications
[J].
ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT II,
2019, 11693
:701-731
[4]
Attrapadung N, 2009, LECT NOTES COMPUT SC, V5536, P168, DOI 10.1007/978-3-642-01957-9_11
[5]
Ciphertext-policy attribute-based encryption
[J].
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2007,
:321-+
[6]
Bodei C, 1999, LECT NOTES COMPUT SC, V1578, P120
[8]
Bonomi F., 2012, P MCC WORKSH MOB CLO, P13, DOI [10.1145/2342509.2342513, DOI 10.1145/2342509.2342513]
[9]
Leakage-Abuse Attacks Against Searchable Encryption
[J].
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2015,
:668-679
[10]
Access Control Encryption: Enforcing Information Flow with Cryptography
[J].
THEORY OF CRYPTOGRAPHY, TCC 2016-B, PT II,
2016, 9986
:547-576