[1] |
SAHAI A, WATERS B.Fuzzy Identity-based Encryption[C]//IACR. 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, May 22-26, 2005, Aarhus, Denmark. Heidelberg: Springer, 2005: 457-473.
|
[2] |
AJTAI M, DWORK C.A Public-key Cryptosystem with Worst-case/Average-case Equivalence[C]//ACM. 29th Annual ACM Symposium on Theory of Computing Symposium on Theory of Computing, May 4-6, 1997, El Paso, Texas, USA. New York: ACM, 1997: 284-293.
|
[3] |
REGEV O. On Lattices, Learning with Errors, Random Linear Codes, and Cryptography[C]//ACM. 37th Annual ACM Symposium on Theory of Computing, May 22-24, 2005, Baltimore, MD, USA. New York: ACM, 2005: 84-93.
|
[4] |
AGRAWAL S, BOYEN X, VAIKUNTANATHAN V, et al.Functional Encryption for Threshold Functions (or Fuzzy IBE) from Lattices[C]//Springer. 15th International Conference on Practice and Theory in Public Key Cryptography, May 21-23, 2012, Darmstadt, Germany. Heidelberg: Springer, 2012: 280-297.
|
[5] |
BOYEN X.Attribute-based Functional Encryption on Lattices[C]//Springer. 10th Theory of Cryptography Conference on Theory of Cryptography, March 3-6, 2013, Tokyo, Japan. Heidelberg: Springer, 2013: 122-142.
|
[6] |
LIU Ximeng, MA Jianfeng, XIONG Jinbo, et al.Threshold Attribute-based Encryption with Attribute Hierarchy for Lattices in the Standard Model[J]. IET Information Security, 2014, 8(4): 217-223.
|
[7] |
ZHAO Jian, GAO Haiying, ZHANG Junqi.Attribute-based Encryption for Circuitson Lattices[J]. Tsinghua Science and Technology, 2014, 45(5): 463-469.
|
[8] |
WANG Yongtao.Lattice Ciphertext Policy Attribute-based Encryption in the Standard Model[J]. International Journal of Network Security, 2014, 16(6): 444-451.
|
[9] |
LYUBASHEVSKY V, PEIKERT C, REGEV O.On Ideal Lattices and Learning with Errors over Rings[C]//Springer. 29th Annual International Conference on Theory and Applications of Cryptographic Techniques, May 30-June 3, 2010, French Riviera. Heidelberg: Springer, 2010: 1-23.
|
[10] |
ZHU Weiling, YU Jinping, WANG Ting, et al.Efficient Attribute-Based Encryption from R-LWE[J]. Chinese Journal of Electronics, 2014, 23(4): 778-782.
|
[11] |
吴立强,杨晓元,韩益亮. 基于理想格的高效模糊身份加密方案[J]. 计算机学报,2015,38(4):775-782.
|
[12] |
TAN S F, SAMSUDIN A.Lattice Ciphertext-policy Attribute-based Encryption from Ring-LWE[C]//IEEE. 2015 International Symposium on Technology Management and Emerging Technologies, August, 25-27, 2015, Langkawai Island, Malaysia. New Jersey: IEEE, 2015: 258-262.
|
[13] |
孙泽栋,祝跃飞,顾纯祥,等. 基于RLWE的密钥策略属性加密体制[J]. 通信学报,2016,37(Z1):125-131.
|
[14] |
杨海滨. 一种新的格上基于身份的分层加密方案[J]. 武汉大学学报理学版,2016,62(2):155-160.
|
[15] |
CHASE M.Multi-authority Attribute Based Encryption[C]//Springer. 4th Conference on Theory of Cryptography, February 21-24, 2007, Amsterdam, Netherlands. Heidelberg: Springer, 2007: 515-534.
|
[16] |
ZHANG Guoyan, QIN Jing, QAZI S.Multi-authority Attribute-based Encryption Scheme from Lattices[J]. Journal of Universal Computerence, 2015, 21(3): 483-501.
|
[17] |
闫玺玺,叶青,刘宇. 云环境下支持隐私保护和用户撤销的属性基加密方案[J]. 信息网络安全,2017(6):14-21.
|
[18] |
Gentry C, Peikert C, Vaikuntanathan V.Trapdoors for Hard Lattice and New Cryptographic Constructions[C]//ACM. 40th Annual ACM Symposium on Theory of Computing, May 17-20, 2008, Victoria, Canada. New York: 2008: 197-206.
|
[19] |
卿勇,孙伟,熊虎,等. 云计算中可撤销存储的外包加解密CP-ABE方案[J]. 信息网络安全,2017(6):6-13.
|