共 18 条
- [1] Sahai A., Waters B., Fuzzy identity-based encryption, Proc of EUROCRYPT'05, pp. 457-473, (2005)
- [2] Bethencourt J., Sahai A., Waters B., Ciphertext-policy attribute-based encryption, Proc of IEEE Symp on Security and Privacy, pp. 321-334, (2007)
- [3] Goyal V., Pandey O., Sahai A., Et al., Attribute-based encryption for fine-grained access control of encrypted data, Proc of the 13th ACM Conf on Computer and Communications Security, pp. 89-98, (2006)
- [4] Waters B., Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization, Proc of PKC'11, pp. 53-70, (2011)
- [5] Lewko A., Okamoto T., Sahai A., Et al., Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption, Proc of EUROCRYPT'10, pp. 62-91, (2010)
- [6] Okamoto T., Takashima K., Fully secure functional encryption with general relations from the decisional linear assumption, Proc of CRYPTO'10, pp. 191-208, (2010)
- [7] Hinek M.J., Jiang S., Safavi-Naini R., Et al., Attribute-based encryption with key cloning protection
- [8] Li J., Ren K., Kim K., A2BE: Accountable attribute-based encryption for abuse free access control
- [9] Liu Z., Cao Z., Wong D.S., White-box traceable ciphertext-policy attribute-based encryption supporting any monotone access structures, IEEE Trans on Information Forensics and Security, 8, 1, pp. 76-88, (2013)
- [10] Liu Z., Cao Z., Wong D.S., Traceable CP-ABE: How to trace decryption devices found in the wild, IEEE Trans on Information Forensics and Security, 10, 1, pp. 55-68, (2015)