共 21 条
- [1] Sahai A., Waters B., Fuzzy Identity-based Encryption, Lecture Notes in Computer Science: 3494, pp. 457-473, (2005)
- [2] Jiang Y., Susilo W., Mu Y., Et al., Ciphertext-policy Attribute-based Encryption against Key-delegation Abuse in Fog Computing, Future Generation Computer Systems, 78, pp. 720-729, (2018)
- [3] Qiao H., Ren J., Wang Z., Et al., Compulsory Traceable Ciphertext-policy Attribute-based Encryption against Privilege Abuse in Fog Computing, Future Generation Computer Systems, 88, pp. 107-116, (2018)
- [4] Chase M., Multi-authority Attribute Based Encryption, Lecture Notes in Computer Science: 4392, pp. 515-534, (2007)
- [5] Lewko A., Waters B., Decentralizing Attribute-based Encryption, Lecture Notes in Computer Science: 6632, pp. 568-588, (2011)
- [6] Zhong H., Cui J., Zhu W., Et al., Efficient and Verifiable Multi-authority Attribute Based Encryption Scheme, Journal of Software, 29, 7, pp. 2006-2017, (2018)
- [7] Xu Q., Tan C., Fan Z., Et al., Secure Data Access Control for Fog Computing Based on Multi-authority Attribute-Based Signcryption with Computation Outsourcing and Attribute Revocation, Sensors, 18, 5, (2018)
- [8] Yan X., Liu Y., Hu M., Et al., LWE-based Multi-authority Attribute-based Encryption Scheme in Cloud Environment, Netinfo Security, 9, pp. 128-133, (2017)
- [9] Yan X., Liu Y., Li Z., Et al., Multi-authority Attribute-based Encryption Scheme with Policy Semi-hidden and Dynamic Updating, Journal of Xidian University, 45, 2, pp. 122-128, (2018)
- [10] Zhang K., Li H., Ma J., Et al., Efficient Large-Universe Multi-authority Ciphertext-policy Attribute-based Encryption with White-box Traceability, Science China Information Sciences, 61, 3, (2018)