共 32 条
[1]
Belguith S., 2017, P 14 INT C SEC CRYPT, V6, P212
[2]
Ciphertext-policy attribute-based encryption
[J].
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2007,
:321-+
[3]
Birkett J., 2010, PREDICATE BASED KEY, P282
[4]
An Efficient Attribute-Based Authenticated Key Exchange Protocol
[J].
CRYPTOLOGY AND NETWORK SECURITY (CANS 2017),
2018, 11261
:493-503
[5]
Emura Keita, 2012, International Journal of Applied Cryptography, V2, P199, DOI 10.1504/IJACT.2012.045589
[6]
Gagne Martin, 2012, Pairing-Based Cryptography - Pairing 2012. 5th International Conference. Revised Selected Papers, P295, DOI 10.1007/978-3-642-36334-4_19
[7]
Gagné M, 2010, LECT NOTES COMPUT SC, V6280, P154, DOI 10.1007/978-3-642-15317-4_11
[8]
Gentry C., 2014, IACR Cryptology ePrint Archive, V2014, P929
[9]
Gorantla MC, 2010, LECT NOTES COMPUT SC, V6168, P300, DOI 10.1007/978-3-642-14081-5_19
[10]
Goyal V., 2006, P 13 ACM C COMP COMM, P89, DOI DOI 10.1145/1180405.1180418