共 24 条
- [1] Shamir A., Identity-based cryptosystems and signatures schemes, Proc of the CRYPTO 1984, pp. 47-53, (1985)
- [2] Sahai A., Waters B., Fuzzy identity-based encryption, Proc of the Eurocrypt 2005, pp. 457-473, (2005)
- [3] Goyal V., Pandey O., Et al., Attribute-based encryption for fine-grained access control of encryption data, Proc of the 13th ACM CCS, pp. 89-98, (2006)
- [4] Attrapadung N., Imai H., Dual-policy attribute based encryption, Proc of the ACNS'09, pp. 168-185, (2009)
- [5] Li Q., Feng D.G., Zhang L.W., Et al., Enhanced attribute-based authenticated key agreement protocol in the standard model, Chinese Journal of Computers, 36, 10, pp. 2156-2167, (2013)
- [6] Xiong J.B., Yao Z.Q., Ma J.F., Et al., A secure self-destruction scheme for composite documents with attribute based encryption, Acta Electronica Sinica, 42, 2, pp. 366-376, (2014)
- [7] Wei J.H., Liu W.F., Hu X.X., Forward-secure ciphertext-policy attribute-based encryption scheme, Journal on Communications, 35, 7, pp. 38-45, (2014)
- [8] Yang P., Cao Z., Dong X., Fuzzy identity based signature with applications to biometric authentication, Compute and Electrical Engineering, 37, pp. 532-540, (2011)
- [9] Khader D., Attribute based group signatures, (2007)
- [10] Khader D., Attribute based group signature with revocation