共 20 条
[1]
Lewko A., Okamoto T., Sahai A., Et al., Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption [G], LNCS 6110: Advances in Cryptology (EUROCRYPT2010), pp. 62-91, (2010)
[2]
Okamoto T., Takashima K., Adaptively attribute-hiding (hierarchical) inner product encryption [G], LNCS 7237: Advances in Cryptology (EUROCRYPT2012), pp. 591-608, (2012)
[3]
Sahai A., Seyalioglu H., Waters B., Dynamic credentials and ciphertext delegation for attribute-based encryption [G], LNCS 7417: Advances in Cryptology (Crypto2012), pp. 199-217, (2012)
[4]
Waters B., Functional encryption for regular languages [G], LNCS 7417: Advances in Cryptology (Crypto2012), pp. 218-235, (2012)
[5]
Sahai A., Waters B., Attribute-based encryption for circuits from multi-linear maps [G], LNCS 8043: Advances in Cryptology (Crypto2013), pp. 479-499, (2013)
[6]
Gorbunov S., Vaikuntanathan V., Wee H., Functional encryption with bounded collusions via multi-party computation [G], LNCS 7417: Advances in Cryptology (CRYPTO2012), pp. 162-179, (2012)
[7]
Gorbunov S., Vaikuntanathan V., Wee H., Attribute-based encryption for circuits, Proc of the 45th Annual ACM Symp on Theory of Computing, pp. 545-554, (2013)
[8]
Goyal V., Pandey O., Sahai A., Et al., Attribute-based encryption for finegrained access control of encrypted data, Proc of the 13th ACM Conf on Computer and Communications Security, pp. 89-98, (2006)
[9]
Sahai A., Waters B., Fuzzy identity basedeEncryption [G], LNCS 3494: Advances in Cryptology (EUROCRYPT2005), pp. 457-473, (2005)
[10]
Ostrovsky R., Sahai A., Waters B., Attribute-based encryption with nonmonotonic access structures, Proc of the 14th ACM Conf on Computer and Communication Security, pp. 195-203, (2007)