共 6 条
- [1] Ciphertext-Policy Attribute Based Encryption Supporting Any Monotone Access Structures Without Escrow[J]. ZHAO Qianqian,ZHANG Yuqing,ZHANG Guanghua,WANG He.Chinese Journal of Electronics. 2017(03)
- [2] Ciphertext-Policy Attribute-Based Encryption with Short Keys[J]. XU Peng,TANG Yong,JIANG Wenbin,JIN Hai,ZOU Deqing.Chinese Journal of Electronics. 2014(04)
- [3] Attribute-based encryption without key cloning[J] . M. Jason Hinek,Shaoquan,Jiang,Reihaneh,Safavi-Naini,Siamak,F.,Shahandashti.Int. J. of Applied Cryptography . 2012 (3)
- [5] DAC-MACS:Effective data access control for multi-authority cloud storage systems .2 Kan Y,Xiaohua J,Kui R,Bo Z. 2013 Proceedings IEEE INFOCOM . 2013
- [6] Public Traceability in Traitor Tracing Schemes .2 CHABANNE H,PHAN D H,POINTCHEVAL D. International Conference on the Theory and Applications of Cryptographic Tech-niques . 2005