共 25 条
[1]
Agrawal S, 2011, IACR CRYPTOL EPRINT, V2011, P414
[2]
Agrawal S, 2010, LECT NOTES COMPUT SC, V6223, P98, DOI 10.1007/978-3-642-14623-7_6
[3]
Agrawal S, 2010, LECT NOTES COMPUT SC, V6110, P553
[4]
Ajtai M., 1996, P STOC 96 PHILADELPH, P99
[5]
Ajtai Miklos, 1997, P 29 ANN ACM S THEOR, P284, DOI [DOI 10.1145/258533.258604, 10.1145/258533.258604]
[7]
[Anonymous], 1999, INT C AUTOMATA LANGU
[8]
Ciphertext-policy attribute-based encryption
[J].
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2007,
:321-+
[9]
Boneh D., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P213
[10]
Boyen X, 2013, LECT NOTES COMPUT SC, V7785, P122, DOI 10.1007/978-3-642-36594-2_8