共 26 条
[1]
Attrapadung N, 2011, LECT NOTES COMPUT SC, V6571, P90, DOI 10.1007/978-3-642-19379-8_6
[2]
Changji Wang, 2011, Proceedings of the 2011 Seventh International Conference on Computational Intelligence and Security (CIS 2011), P905, DOI 10.1109/CIS.2011.204
[3]
Chen JH, 2012, INFORMATICA-LITHUAN, V23, P27
[4]
Dodis Y., 2002, IACR EPRINT ARCH
[5]
Goyal V., 2006, P 2006 INT C PRIVACY, P1
[6]
Goyal V, 2008, LECT NOTES COMPUT SC, V5126, P579, DOI 10.1007/978-3-540-70583-3_47
[7]
Attribute-based signature scheme
[J].
PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE,
2008,
:509-+
[8]
A key-insulated CP-ABE with key exposure accountability for secure data sharing in the cloud
[J].
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS,
2016, 10 (05)
:2394-2406
[9]
High efficient key-insulated attribute based encryption scheme without bilinear pairing operations
[J].
SPRINGERPLUS,
2016, 5
:1-12
[10]
Hu C. Q., 2016, LECT NTOES I COMPUTE, V164, P418