共 11 条
- [1] Yang Y., Liu J.K., Liang K., Et al., Extended Proxy-assisted Approach: Achieving Revocable Fine-grained Encryption of Cloud Data, Lecture Notes in Computer Science, 9327, pp. 146-166, (2015)
- [2] Sahai A., Waters B., Fuzzy Identity-based Encryption, Lecture Notes in Computer Science, 3494, pp. 457-473, (2005)
- [3] Goyal V., Pandey O., Sahai A., Et al., Attribute-based Encryption for Fine-grained Access Control of Encrypted Data, Proceedings of the ACM Conference on Computer and Communications Security, pp. 89-98, (2006)
- [4] Bethencourt J., Sahai A., Waters B., Ciphertext-policy Attribute-based Encryption, Proceedings of the IEEE Symposium on Security and Privacy, pp. 321-334, (2007)
- [5] Waters B., Ciphertext-policy Attribute-based Encryption: an Expressive, Efficient, and Provably Secure Realization, Lecture Notes in Computer Science, 6571, pp. 53-70, (2011)
- [6] Yang K., Jia X., Ren K., Secure and Verifiable Policy Update Outsourcing for Big Data Access Control in the Cloud, IEEE Transactions on Parallel & Distributed Systems, 26, 12, pp. 3461-3470, (2015)
- [7] Ying Z., Ma J., Cui J., Partially Policy Hidden CP-ABE Supporting Dynamic Policy Updating, Journal on Communications, 36, 12, pp. 178-189, (2015)
- [8] Gentry C., Fully Homomorphic Encryption Using Ideal Lattices, Proceedings of the Annual ACM Symposium on Theory of Computing, pp. 169-178, (2009)
- [9] Brakerski Z., Gentry C., Vaikuntanathan V., (Leveled) Fully Homomorphic Encryption without Bootstrapping, ACM Transactions on Computation Theory, 6, 3, (2014)
- [10] Halevi S., Shoup V., Design and Implementation of a Homomorphic-encryption Library