共 10 条
[1]
Hohenberger S, 2014, LECT NOTES COMPUT SC, V8383, P293, DOI 10.1007/978-3-642-54631-0_17
[2]
Katz J, 2008, LECT NOTES COMPUT SC, V4965, P146
[3]
Lewko A, 2011, LECT NOTES COMPUT SC, V6632, P547, DOI 10.1007/978-3-642-20465-4_30
[4]
Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2010,
2010, 6110
:62-+
[5]
Okamoto T, 2012, LECT NOTES COMPUT SC, V7658, P349, DOI 10.1007/978-3-642-34961-4_22
[6]
Okamoto T, 2012, LECT NOTES COMPUT SC, V7237, P591, DOI 10.1007/978-3-642-29011-4_35
[7]
Okamoto T, 2010, LECT NOTES COMPUT SC, V6223, P191, DOI 10.1007/978-3-642-14623-7_11
[8]
Okamoto T, 2009, LECT NOTES COMPUT SC, V5912, P214, DOI 10.1007/978-3-642-10366-7_13
[9]
Rouselakis Y., 2013, P 2013 ACM SIGSAC C, P463
[10]
Fuzzy identity-based encryption
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS,
2005, 3494
:457-473