共 40 条
[1]
Ateniese G., 2006, ACM Transactions on Information and Systems Security, V9, P1, DOI 10.1145/1127345.1127346
[2]
Beimel A., 1996, SECURE SCHEMES SECRE
[3]
Ciphertext-policy attribute-based encryption
[J].
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2007,
:321-+
[4]
Blaze M, 1998, LECT NOTES COMPUT SC, V1403, P127, DOI 10.1007/BFb0054122
[5]
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[6]
Boneh D, 2007, LECT NOTES COMPUT SC, V4392, P535
[7]
Emura K, 2009, LECT NOTES COMPUT SC, V5451, P13, DOI 10.1007/978-3-642-00843-6_2