共 32 条
[1]
Amiri E, 2009, PROCEEDINGS OF THE TWENTIETH ANNUAL ACM-SIAM SYMPOSIUM ON DISCRETE ALGORITHMS, P336
[2]
[Anonymous], 2011, ACITA
[3]
[Anonymous], STOC 96
[4]
Ciphertext-policy attribute-based encryption
[J].
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2007,
:321-+
[5]
Boneh D., 2010, Proc. 10th Annu. ACM Work-shop Dig. Rights Manag, P3
[6]
Boneh D, 2008, CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P501
[8]
Chor B., 1994, Advances in Cryptology - CRYPTO '94. 14th Annual International Cryptology Conference. Proceedings, P257
[9]
Garg S, 2013, LECT NOTES COMPUT SC, V8043, P479, DOI 10.1007/978-3-642-40084-1_27
[10]
Gorbunov S, 2013, STOC'13: PROCEEDINGS OF THE 2013 ACM SYMPOSIUM ON THEORY OF COMPUTING, P545