共 48 条
[31]
Herranz J, 2010, LECT NOTES COMPUT SC, V6056, P19
[32]
Hohenberger S, 2013, LECT NOTES COMPUT SC, V7778, P162, DOI 10.1007/978-3-642-36362-7_11
[33]
Junod Pascal., 2010, Proc. ACM DRM'10, P13, DOI DOI 10.1145/1866870.1866875
[34]
Making Any Attribute-Based Encryption Accountable, Efficiently
[J].
COMPUTER SECURITY (ESORICS 2018), PT II,
2018, 11099
:527-547
[35]
Revocation Systems with Very Small Private Keys
[J].
2010 IEEE SYMPOSIUM ON SECURITY AND PRIVACY,
2010,
:273-285
[36]
Lynn B., The stanford pairing based crypto library
[38]
A Ciphertext-Policy Attribute-based Encryption Scheme With Optimized Ciphertext Size And Fast Decryption
[J].
PROCEEDINGS OF THE 2017 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIA CCS'17),
2017,
:230-240
[39]
Naor D., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P41
[40]
Rouselakis Y., 2013, P 2013 ACM SIGSAC C, P463