共 52 条
[31]
Attribute-Based Encryption with Non-Monotonic Access Structures
[J].
CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2007,
:195-+
[32]
Dynamic Keyword Search With Hierarchical Attributes in Cloud Computing
[J].
IEEE ACCESS,
2018, 6
:68948-68960
[34]
Fuzzy identity-based encryption
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS,
2005, 3494
:457-473
[35]
Song DXD, 2000, P IEEE S SECUR PRIV, P44, DOI 10.1109/SECPRI.2000.848445
[36]
Stefanov Emil, 2014, 21 ANN NETWORK DISTR, P72, DOI DOI 10.14722/NDSS.2014.23298
[37]
Sun WH, 2014, IEEE INFOCOM SER, P226, DOI 10.1109/INFOCOM.2014.6847943
[39]
Wang C., 2013, P CYB SAF SEC 5 INT, P377
[40]
Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization
[J].
PUBLIC KEY CRYPTOGRAPHY - PKC 2011,
2011, 6571
:53-70