共 16 条
[1]
Sahai A., Waters B., Fuzzy identity-based encryption, Proceedings of the Eurocrypt 2005, 3494, pp. 457-473, (2005)
[2]
Maji H.K., Prabhakaran M., Rosulek M., Attribute-based signatures, Proceedings of the Cryptographers' Track at the RSA Conference 2011, 6558, pp. 376-392, (2011)
[3]
Feng D., Chen C., Research on attribute-based cryptography, Journal of Cryptologic Research, 1, 1, pp. 1-12, (2014)
[4]
Ajtai M., Generating hard instances of lattice problems, Proceedings of the 28th Annual ACM Symposium on Theory of Computing (STOC'96), pp. 99-108, (1996)
[5]
Gentry C., Peikert C., Vaikuntanathan V., Trapdoors for hard lattices and new cryptographic constructions, Proceedings of the 40th Annual ACM Symposium on Theory of Computing (STOC'08), pp. 197-206, (2008)
[6]
Agrawal S., Boneh D., Boyen X., Efficient lattice (H)IBE in the standard model, Proceedings of the Eurocrypt 2010, pp. 553-572, (2010)
[7]
Boyen X., Lattice mixing and vanishing trapdoors: A framework for fully secure short signatures and more, Proceedings of the 13th International Conference on Practice and Theory in Public Key Cryptography (PKC'10), pp. 499-517, (2010)
[8]
Boyen X., Attribute-based functional encryption on lattices, Proceedings of the 10th Theory of Cryptography Conference (TCC'13), pp. 122-142, (2013)
[9]
Goyal V., Pandey O., Sahai A., Et al., Attribute-based encryption for fine-grained access control of encrypted data, Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS'06), pp. 89-98, (2006)
[10]
Wang Y., Lattice ciphertext policy attribute-based encryption in the standard model, International Journal of Network Security, 16, 4, pp. 358-365, (2014)