共 33 条
[1]
Ciphertext-policy attribute-based encryption
[J].
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2007,
:321-+
[2]
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[3]
Bonomi F., 2012, P 1 ED MCC WORKSH MO, DOI [10.1145/2342509.2342513, DOI 10.1145/2342509.2342513]
[4]
Cao N, 2011, IEEE INFOCOM SER, P829, DOI 10.1109/INFCOM.2011.5935306
[6]
Cheung L, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P456
[7]
Attribute-Based Encryption with Expressive and Authorized Keyword Search
[J].
INFORMATION SECURITY AND PRIVACY, ACISP 2017, PT I,
2017, 10342
:106-126
[8]
Goyal V., 2006, P 13 ACM C COMP COMM, P89, DOI DOI 10.1145/1180405.1180418
[9]
Horváth M, 2015, LECT NOTES COMPUT SC, V8939, P566, DOI 10.1007/978-3-662-46078-8_47