共 34 条
[1]
[Anonymous], 1996, SECURE SCHEMES SECRE
[2]
Attrapadung N, 2009, LECT NOTES COMPUT SC, V5671, P248, DOI 10.1007/978-3-642-03298-1_16
[3]
Ciphertext-policy attribute-based encryption
[J].
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2007,
:321-+
[4]
Hierarchical identity based encryption with constant size ciphertext
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS,
2005, 3494
:440-456
[5]
Boneh D., 2006, P ACM C COMPUTER COM, P211
[6]
Boneh D., 1999, ADV CRYPTOLOGY CRYPT, V1666, P338, DOI [DOI 10.1007/3-540-48405-1, DOI 10.1007/3-540-48405-122]
[7]
Boneh D, 2006, LECT NOTES COMPUT SC, V4004, P573
[8]
Cheung L, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P456
[9]
Deng H, 2014, LECT NOTES COMPUT SC, V8712, P362, DOI 10.1007/978-3-319-11203-9_21
[10]
Building Efficient Fully Collusion-Resilient Traitor Tracing and Revocation Schemes
[J].
PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10),
2010,
:121-130