共 23 条
- [1] Ciphertext-policy attribute-based encryption [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
- [2] Chase M, 2007, LECT NOTES COMPUT SC, V4392, P515
- [3] Chase M, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P121
- [5] Hierarchical ID-based cryptography [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2002, PROCEEDINGS, 2002, 2501 : 548 - 566
- [6] Goyal V, 2006, P 13 ACM C COMP SEC, P89, DOI DOI 10.1145/1180405.1180418
- [7] Guo R., 2018, J SUPERCOMPUT, P1
- [8] Han JG, 2014, LECT NOTES COMPUT SC, V8713, P73, DOI 10.1007/978-3-319-11212-1_5
- [10] Huiling Qian, 2013, Information and Communications Security. 15th International Conference, ICICS 2013. Proceedings: LNCS 8233, P363, DOI 10.1007/978-3-319-02726-5_26