共 23 条
[2]
CRYPTOGRAPHIC SOLUTION TO A PROBLEM OF ACCESS-CONTROL IN A HIERARCHY
[J].
ACM TRANSACTIONS ON COMPUTER SYSTEMS,
1983, 1 (03)
:239-248
[3]
ATALLAH M, 2007, P 2007 ACM S INF COM, P82
[5]
A concrete security treatment of symmetric encryption
[J].
38TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS,
1997,
:394-403
[6]
Ciphertext-policy attribute-based encryption
[J].
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2007,
:321-+
[8]
Crampton J., 2006, CSFW
[9]
Crampton J, 2011, LECT NOTES COMPUT SC, V6561, P191, DOI 10.1007/978-3-642-19751-2_13
[10]
Access Control Encryption: Enforcing Information Flow with Cryptography
[J].
THEORY OF CRYPTOGRAPHY, TCC 2016-B, PT II,
2016, 9986
:547-576