共 21 条
- [1] BETHENCOURT J, 2011, ADV CRYPTO SOFTWARE
- [2] Ciphertext-policy attribute-based encryption [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
- [3] Boneh D, 2005, LECT NOTES COMPUT SC, V3378, P325
- [4] Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P56
- [5] Cheung L, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P456
- [6] Goyal V., 2006, P 2006 INT C PRIVACY, P1
- [7] Goyal V, 2008, LECT NOTES COMPUT SC, V5126, P579, DOI 10.1007/978-3-540-70583-3_47
- [8] Lewko A, 2010, LECT NOTES COMPUT SC, V5978, P455, DOI 10.1007/978-3-642-11799-2_27
- [9] Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2010, 2010, 6110 : 62 - +