共 33 条
[1]
[Anonymous], 1996, SECURE SCHEMES SECRE
[2]
[Anonymous], 2014, P 9 ACM S INFORM, DOI DOI 10.1145/2590296.2590342
[3]
Ateniese G, 2005, LECT NOTES COMPUT SC, V3352, P165
[4]
Ciphertext-policy attribute-based encryption
[J].
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2007,
:321-+
[5]
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P223
[7]
Boyen X., 2005, Proc. 12th ACM Conference on Computer and Communications Security (CCS), P320
[8]
Chosen-ciphertext security from identity-based encryption
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2004, PROCEEDINGS,
2004, 3027
:207-222
[9]
Chase M, 2007, LECT NOTES COMPUT SC, V4392, P515
[10]
Chase M, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P121