共 10 条
- [1] Hohenberger S, 2014, LECT NOTES COMPUT SC, V8383, P293, DOI 10.1007/978-3-642-54631-0_17
- [2] Katz J, 2008, LECT NOTES COMPUT SC, V4965, P146
- [3] Lewko A, 2011, LECT NOTES COMPUT SC, V6632, P547, DOI 10.1007/978-3-642-20465-4_30
- [4] Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2010, 2010, 6110 : 62 - +
- [5] Okamoto T, 2012, LECT NOTES COMPUT SC, V7658, P349, DOI 10.1007/978-3-642-34961-4_22
- [6] Okamoto T, 2012, LECT NOTES COMPUT SC, V7237, P591, DOI 10.1007/978-3-642-29011-4_35
- [7] Okamoto T, 2010, LECT NOTES COMPUT SC, V6223, P191, DOI 10.1007/978-3-642-14623-7_11
- [8] Okamoto T, 2009, LECT NOTES COMPUT SC, V5912, P214, DOI 10.1007/978-3-642-10366-7_13
- [9] Rouselakis Y., 2013, P 2013 ACM SIGSAC C, P463
- [10] Fuzzy identity-based encryption [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS, 2005, 3494 : 457 - 473