共 29 条
[1]
Attrapadung N., Imai H., Conjunctive broadcast and attribute-based encryption, Pairing-Based Cryptography-Pairing 2009, pp. 248-265, (2009)
[2]
Attrapadung N., Imai H., Attribute-based encryption supporting direct/indirect revocation modes, Cryptography and Coding, pp. 278-300, (2009)
[3]
Babu K.S., Hota J., Jena S.K., Privacy preserving social networking, International Journal of Computational Science and Engineering, 9, 3, pp. 165-176, (2014)
[4]
Benamara M.A., Li H., Secure of personal health records shared in cloud computing using cipher-text attribute based encryption, International Journal of Security and Networks, 10, 3, pp. 183-190, (2015)
[5]
Bethencourt J., Sahai A., Waters B., Ciphertext-policy attribute-based encryption, IEEE Symposium on Security and Privacy, pp. 321-334, (2007)
[6]
Boldyreva A., Goyal V., Kumar V., Identity-based encryption with efficient revocation, Proceedings of the 15th ACM Conference on Computer and Communications Security, pp. 417-426, (2008)
[7]
Boneh D., Franklin M., Identity-based encryption from the weil pairing, Advances in Cryptology-CRYPTO 2001, pp. 213-229, (2001)
[8]
Chase M., Multi-authority attribute based encryption, Theory of Cryptography, 4392, pp. 515-534, (2007)
[9]
Chen X., Li J., Huang X., Li J., Xiang Y., Wong D., Secure outsourced attribute-based signatures, IEEE Transactions on Parallel and Distributed Systems, 25, 12, pp. 3285-3294, (2014)
[10]
Chen X., Li J., Ma J., Tang Q., Lou W., New algorithms for secure outsourcing of modular exponentiation, IEEE Transactions on Parallel and Distributed Systems, 25, 9, pp. 2386-2396, (2014)