共 15 条
[1]
[Anonymous], CIPHERTEXT POLICY AT
[2]
[Anonymous], 1996, SECURE SCHEMES SECRE
[3]
[Anonymous], 102796 ETSI TS
[4]
Ciphertext-policy attribute-based encryption
[J].
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2007,
:321-+
[5]
Goyal V., 2006, P 2006 INT C PRIVACY, P1
[6]
Hohenberger S, 2014, LECT NOTES COMPUT SC, V8383, P293, DOI 10.1007/978-3-642-54631-0_17
[7]
Jingwei Li, 2012, Information and Communication Security. 14th International Conference (ICICS 2012). Proceedings, P191, DOI 10.1007/978-3-642-34129-8_17
[8]
Outsourcing Scheme of ABE Encryption Secure against Malicious Adversary
[J].
ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY,
2017,
:71-82
[9]
Fuzzy identity-based encryption
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS,
2005, 3494
:457-473
[10]
Shi J, 2014, LECT NOTES COMPUT SC, V8712, P419, DOI 10.1007/978-3-319-11203-9_24