[1] |
AJTAI M, DWORK C.A Public-key Cryptosystem with Worst-case/Average-case Equivalence[C]//ACM. 29th Annual ACM Symposium on Theory of Computing Symposium on Theory of Computing, May 4-6, 1997, El Paso, Texas, USA. New York: ACM, 1997: 284-293.
|
[2] |
REGEV O. On Lattices, Learning with Errors, Random Linear Codes, and Cryptography[C]//ACM. 37th Annual ACM Symposium on Theory of Computing, May 22-24, 2005, Baltimore, MD, USA. New York: ACM, 2005: 84-93.
|
[3] |
SAHAI A, WATERS B.Fuzzy Identity-based Encryption[C]//IACR. 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, May 22-26, 2005, Aarhus, Denmark. Heidelberg: Springer, 2005: 457-473.
|
[4] |
计海萍,徐磊,蔚晓玲,等. 云计算环境下基于身份的分层加密管理系统研究[J]. 信息网络安全,2016(5):30-36.
|
[5] |
AGRAWAL S, BOYEN X, VAIKUNTANATHAN V, et al.Functional Encryption for Threshold Functions (or Fuzzy IBE) from Lattices[C]//Springer. 15th International Conference on Practice and Theory in Public Key Cryptography, May 21-23, 2012, Darmstadt, Germany. Heidelberg: Springer, 2012: 280-297.
|
[6] |
BOYEN X.Attribute-based Functional Encryption on Lattices[C]//Springer. 10th Theory of Cryptography Conference on Theory of Cryptography, March 3-6, 2013, Tokyo, Japan. Heidelberg: Springer, 2013: 122-142.
|
[7] |
LIU Ximeng, MA Jianfeng, XIONG Jinbo, et al.Threshold Attribute-based Encryption with Attribute Hierarchy for Lattices in the Standard Model[J]. IET Information Security, 2014, 8(4): 217-223.
|
[8] |
ZHAO Jian, GAO Haiying, ZHANG Junqi.Attribute-based Encryption for Circuitson Lattices[J]. Tsinghua Science and Technology, 2014, 45(5): 463-469.
|
[9] |
WANG Yongtao.Lattice Ciphertext Policy Attribute-based Encryption in the Standard Model[J]. International Journal of Network Security, 2014, 16(6): 444-451.
|
[10] |
CASH D, HOFHEINZ D, KILTZ E, et al.Bonsai Trees, or How to Delegate a Lattice Basis[C]//IACR. 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, May 30-June 3, 2010, French Riviera. Heidelberg, Springer, 2010: 523-552.
|
[11] |
ZHU Weiling, YU Jinping, WANG Ting, et al.Efficient Attribute-Based Encryption from R-LWE[J]. Chinese Journal of Electronics, 2014, 23(4): 778-782.
|
[12] |
吴立强,杨晓元,韩益亮. 基于理想格的高效模糊身份加密方案[J]. 计算机学报,2015,38(4):775-782.
|
[13] |
TAN S F, SAMSUDIN A.Lattice Ciphertext-policy Attribute-based Encryption from Ring-LWE[C]//IEEE. 2015 International Symposium on Technology Management and Emerging Technologies, August, 25-27, 2015, Langkawai Island, Malaysia. New Jersey: IEEE, 2015: 258-262.
|
[14] |
孙泽栋,祝跃飞,顾纯祥,等. 基于RLWE的密钥策略属性加密体制[J]. 通信学报,2016,37(Z1):125-131.
|
[15] |
杨海滨. 一种新的格上基于身份的分层加密方案[J]. 武汉大学学报理学版,2016,62(2):155-160.
|
[16] |
CHASE M.Multi-authority Attribute Based Encryption[C]//Springer. 4th Conference on Theory of Cryptography, February 21-24, 2007, Amsterdam, Netherlands. Heidelberg: Springer, 2007: 515-534.
|
[17] |
韩清德,谢慧,袁志民,等. 一种支持访问结构隐藏的MA-CP-ABE方案[J]. 信息网络安全,2017(1):48-56.
|
[18] |
ZHANG Guoyan, QIN Jing, QAZI S.Multi-authority Attribute-based Encryption Scheme from Lattices[J]. Journal of Universal Computerence, 2015, 21(3): 483-501.
|
[19] |
GENTRY C, PEIKERT C, VAIKUNTANATHAN V.Trapdoors for Hard Lattice and New Cryptographic Constructions[C]//ACM. 40th Annual ACM Symposium on Theory of Computing, May 17-20, 2008, Victoria, Canada. New York: 2008: 197-206.
|
[20] |
AGRAWAL S, BONEH D, BOYEN X. Efficient Lattice (H)IBE in the Standard Model[C]//IACR. 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, May 30-June 3, 2010, French Riviera. Heidelberg, Springer, 2010: 553-572.
|
[21] |
闫玺玺,叶青,刘宇. 云环境下支持隐私保护和用户撤销的属性基加密方案[J]. 信息网络安全,2017(6):14-21.
|