共 22 条
[1]
Sahai A., Waters B., Fuzzy Identity-based Encryption, Proceeding of EUROCRYPT'05, pp. 457-473, (2005)
[2]
Waters B., Efficient Identity-based Encryption without Random Oracles, Proceedings of EUROCRYPT'05, pp. 114-127, (2005)
[3]
Waters B., Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions, Proceedings of CRYPTO'09, pp. 619-636, (2009)
[4]
Fu X., Xue P., Identity-based Preserving Multi-receiver Key Encapsulation, Journal of Xidian University, 41, 5, pp. 8-13, (2014)
[5]
Sun J., Hu Y., Fully Secure Attribute-based Broadcast Encryption, Journal of Xidian University, 39, 4, pp. 23-28, (2012)
[6]
Goyal V., Pandey O., Sahai A., Et al., Attribute-based Encryption for Fine-grained Access Control of Encrypted Data, Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 89-98, (2006)
[7]
Bethencourt J., Sahai A., Waters B., Ciphertext-policy Attribute-based Encryption, Proceeding of the 2007 IEEE Symposium on Security and Privacy, pp. 321-334, (2007)
[8]
Cheung L., Newport C., Provably Secure Ciphertext Policy ABE, Proceeding of the 14th ACM Conference on Computer and Communications Security, pp. 456-465, (2007)
[9]
Waters B., Ciphertext-policy Attribute-based Encryption: an Expressive, Efficient, and Provably Secure Realization, Proceedings of PKC 2011 Computer Science, pp. 53-70, (2011)
[10]
Okamoto T., Takashima K., Fully Secure Unbounded Inner-product and Attribute-based Encryption, Proceedings of ASIACRYPT'12, pp. 349-366, (2012)