[1] |
Chase M.Multi-authority attribute based encryption[C]//Theory of Cryptography. Springer Berlin Heidelberg, 2007: 515-534.
|
[2] |
Božović V, Socek D, Steinwandt R, et al.Multi-authority attribute-based encryption with honest-but-curious central authority[J]. International Journal of Computer Mathematics, 2012, 89(3): 268-283.
|
[3] |
Lin H, Cao Z, Liang X, et al.Secure threshold multi authority attribute based encryption without a central authority[J]. Information Sciences, 2010, 180(13): 2618-2632.
|
[4] |
Gennaro R, Jarecki S, Krawczyk H, et al.Secure distributed key generation for discrete-log based cryptosystems[C]//Advances in Cryptology-EUROCRYPT' 99. Springer Berlin Heidelberg, 1999: 295-310.
|
[5] |
Lewko A, Waters B.Decentralizing attribute-based encryption[C]//Advances in Cryptology-EUROCRYPT 2011. Springer Berlin Heidelberg, 2011: 568-588.
|
[6] |
Chase M, Chow S S M. Improving privacy and security in multi-authority attribute-based encryption[C]//Proceedings of the 16th ACM conference on Computer and communications security. ACM, 2009: 121-130.
|
[7] |
Liu Z, Cao Z, Huang Q, et al.Fully secure multi-authority ciphertext-policy attribute-based encryption without random oracles[C]//Computer Security-ESORICS 2011. Springer Berlin Heidelberg, 2011: 278-297.
|
[8] |
Han J, Susilo W, Mu Y, et al.Privacy-preserving decentralized key-policy attribute-based encryption[J]. Parallel and Distributed Systems, IEEE Transactions on, 2012, 23(11): 2150-2162.
|
[9] |
Qian H, Li J, Zhang Y.Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption with Fully Hidden Access Structure[C]//Information and Communications Security. Springer International Publishing, 2013: 363-372.
|
[10] |
Boneh D, Boyen X.Short signatures without random oracles[C]//Advances in Cryptology-EUROCRYPT 2004. Springer Berlin Heidelberg, 2004: 56-73.
|
[11] |
Ibraimi L, Tang Q, Hartel P, et al.Efficient and provable secure ciphertext-policy attribute-based encryption schemes[C]//Information Security Practice and Experience. Springer Berlin Heidelberg, 2009: 1-12.
|