共 15 条
[1]
Sahai A., Waters B., Fuzzy Identity-based Encryption, 3494, pp. 457-473, (2005)
[2]
Goyal V., Pandey O., Sahai A., Waters B., Attribute-based Encryption For Fine Grained Access Control of Encrypted Data, pp. 89-98
[3]
Bethencourt J., Sahai A., Waters B., Ciphertext Policy Attribute Based Encryption, IEEE Symposium On Security and Privacy, pp. 321-334
[4]
Cheung L., Newport C., Provably Secure Ciphertext Policy ABE, pp. 456-465
[5]
Goyal V., Jain A., Pandey O., Sahai A., Bounded Ciphertext Policy Attribute Based Encryption, 5126, pp. 579-591, (2008)
[6]
Liang X., Cao Z., Lin H., Xing D., Provably secure and efficient bounded ciphertext policy attribute based encryption, Proceedings of the 4th International Symposium On Information, Computer and Communications Security, pp. 343-352, (2009)
[7]
Ibraimi L., Tang Q., Hartel P., Jonker W., Efficient and Provable Secure Cipher -text Policy Attribute-based Encryption Schemes, 5451, pp. 1-12, (2009)
[8]
Waters B., Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization, 6571, pp. 90-107
[9]
Lewko A., Okamoto T., Sahai A., Katsuyuki T., Brent W., Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption, EUROCRYPT, 6110, pp. 62-91, (2010)
[10]
Boneh D., Franklin M., Identity Based Encryption from the Weil Pairing[J], Journal of Computing, 32, 3, pp. 586-615, (2001)