共 37 条
[1]
Ajtai M., 1996, Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, P99, DOI 10.1145/237814.237838
[2]
Ciphertext-policy attribute-based encryption
[J].
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2007,
:321-+
[3]
Buchmann J., 2016, P 2 ACM INT WORKSH I, P2
[4]
Gentry C, 2008, ACM S THEORY COMPUT, P197
[5]
Georgescu Adela, 2013, Information and Communication Technology. International Conference, ICT-EurAsia 2013. Proceedings: LNCS 7804, P353, DOI 10.1007/978-3-642-36818-9_39
[6]
Goldreich O, 1997, LECT NOTES COMPUT SC, V1294, P112
[7]
Goyal V., 2006, P 2006 INT C PRIVACY, P1, DOI DOI 10.1145/1180405.1180418
[8]
Huang X.F., 2015, 2015 24 INT C COMPUT, P1, DOI [10.1109/ICCCN.2015.7288431, DOI 10.1109/ICCCN.2015.7288431]