共 13 条
[1]
[Anonymous], 2013, WUHAN UNIV J NAT SCI, DOI DOI 10.1007/s11859-013-0925-9
[2]
Birje Mahantesh N., 2017, International Journal of Cloud Computing, V6, P32
[3]
Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2010,
2010, 6110
:62-+
[4]
A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2015, 52
:95-108
[5]
Liang K, 2014, LECT NOTES COMPUT SC, V8712, P257, DOI 10.1007/978-3-319-11203-9_15
[8]
Fuzzy identity-based encryption
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS,
2005, 3494
:457-473
[9]
ShuLan Wang, 2015, Applied Mechanics and Materials, V701-702, P911, DOI 10.4028/www.scientific.net/AMM.701-702.911