[1] |
Ostrovsky R, Sahai A, Waters B.Attribute-Based encryption with non-monotonic access structures[C]// Proc. of the ACM Conf. on Computer and Communications Security, 2007:195-203.
|
[2] |
Pirretti M, Traynor P, McDaniel P, et al. Secure attribute-based systems[J]. Journal of Computer Security, 2010, 18(5): 799-837.
|
[3] |
Traynor P, Butler K, Enck W, etal. Realizing massive-scale conditional access systems through attribute-based cryptosystems[C]// Proc. of the 15th Annual Network and Distributed System Security Symp. (NDSS 2008), 2008: 1-13.
|
[4] |
Stinson D.R.著.密码学原理与实践(第二版)[M]. 冯登国译. 北京: 电子工业出版社,2003 .
|
[5] |
Cheung L, Cooley JA, Khazan R, et al. Collusion-Resistant group key management using attribute-based encryption[EB/OL]..
|
[6] |
Lai J Z,Deng R H, Li Y J.Expressive CP-ABE with partially hidden access structures[C]// Proceedings of the 7th ACM Symposium on Information Computer and Communications Security, 2012: 18-19.
|
[7] |
Baden R, Bender A, Spring N, et al.Persona: An online social network with user-defined privacy[C]//SIGCOMM '09 Proceedings of the ACM SIGCOMM 2009 conference on Data communication, 2009: 135-146.
|
[8] |
Sahai A, Waters B.Fuzzy identity-based encryption[C]// Cramer R, ed. Advances in Cryptology-EUROCRYPT 2005, 2005: 457-473.
|
[9] |
Goyal V, Pandey O, Sahai A, et al.Attribute-Based encryption for fine-grained access control of encrypted data[C]//CCS’06 Proceedings of the 13th ACM conference on Computer and communications security, 2006:89-98.
|
[10] |
Bethencourt J, Sahai A, Waters B.Ciphertext-Policy attribute-based encryption[C]//Proc. of the 2007 IEEE Symp. on Security and Privacy, 2007:321-334.
|
[11] |
Kapadia A, Tsang P P, Smith S W.Attribute-Based publishing with hidden credentials and hidden policies[C]// Proc. of the 14th Annual Network and Distributed System Security Symp. (NDSS 2007), 2007:179-192.
|
[12] |
Cheung L, Newport C.Provably secure ciphertext policy ABE[C]//Proc. of the ACM Conf. on Computer and Communications Security, 2007: 456-465.
|
[13] |
Yu S C, Ren K, Lou W J.Attribute-Based content distribution with hidden policy[C]//Proc. of the 4th Workshop on Secure Network Protocols (NPSec), 2008: 39-44.
|
[14] |
Yu S C, Ren K, Lou W J.Attribute-Based on-demand multicast group setup with membership anonymity[J]. Computer Networks, 2010, 54(3): 377-386.
|
[15] |
Nishide T, Yoneyama K, Ohta K.Attribute-Based encryption with partially hidden encryptor-specified access structures[C]//Proc. of the Applied Cryptography and Network Security, 2008:111-129.
|
[16] |
Lai J, Deng R H, Li Y.Fully secure cipertext-policy hiding CP-ABE[C]//Information Security Practice and Experience, 2011:24-39.
|