共 19 条
- [1] Ciphertext-policy attribute-based encryption [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
- [2] Boldyreva A, 2008, CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P417
- [3] Boneh D., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P213
- [4] Hierarchical ID-based cryptography [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2002, PROCEEDINGS, 2002, 2501 : 548 - 566
- [5] Goyal V., 2006, P 2006 INT C PRIVACY, P1
- [7] Toward hierarchical identity-based encryption [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2002, PROCEEDINGS, 2002, 2332 : 466 - 481
- [8] Jae Hong Seo, 2015, Topics in Cryptology - CT-RSA 2015. The Cryptographers' Track at the RSA Conference 2015. Proceedings: LNCS 9048, P106, DOI 10.1007/978-3-319-16715-2_6
- [9] Jae Hong Seo, 2013, Topics in Cryptology - CT-RSA 2013. The Cryptographers Track at the RSA Conference 2013. Proceedings, P343, DOI 10.1007/978-3-642-36095-4_22
- [10] Lewko A, 2010, LECT NOTES COMPUT SC, V5978, P455, DOI 10.1007/978-3-642-11799-2_27