共 12 条
[1]
Hierarchical identity based encryption with constant size ciphertext
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS,
2005, 3494
:440-456
[2]
Delerablee C, 2007, LECT NOTES COMPUT SC, V4575, P39
[3]
Goyal V., 2006, 13 ACM CONFCOMPUT CO, P89, DOI DOI 10.1145/1180405.1180418
[4]
Jiang Z., 2013, P INT C INF SCI CLOU, P185
[6]
Lu R., 2010, Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, P282
[7]
Varun I, 2014, INT J COMPUT SCI MOB, V3, P730
[8]
Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization
[J].
PUBLIC KEY CRYPTOGRAPHY - PKC 2011,
2011, 6571
:53-70
[9]
Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing
[J].
2010 PROCEEDINGS IEEE INFOCOM,
2010,