共 26 条
[1]
[Anonymous], 1996, SECURE SCHEMES SECRE
[2]
Ciphertext-policy attribute-based encryption
[J].
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2007,
:321-+
[3]
Boneh D, 2005, LECT NOTES COMPUT SC, V3378, P325
[4]
Boneh D, 2007, LECT NOTES COMPUT SC, V4392, P535
[6]
Chen XF, 2007, LECT NOTES COMPUT SC, V4521, P18
[7]
Cheung L, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P456
[8]
Fully Secure Online/Offline Predicate and Attribute-Based Encryption
[J].
INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2015,
2015, 9065
:331-345
[9]
Even S, 1996, J CRYPTOL, V9, P35, DOI 10.1007/BF02254791
[10]
Goyal V., 2006, P 2006 INT C PRIVACY, P1