[1] |
SAHAI A, WATERS B.Fuzzy Identity-Based Encryption[C]//Springer. 2005 International Conference on Theory and Applications of Cryptographic Techniques, May 22-26, 2005, Aarhus, Denmark. Heidelberg: Springer, 2005: 457-473.
|
[2] |
YAN Xixi, YE Qing, LIU Yu.Attribute-based Encryption Scheme Supporting Privacy Preserving and User Revocation in the Cloud Environment[J]. Netinfo Security, 2017, 17(6): 14-21.
|
|
闫玺玺,叶青,刘宇. 云环境下支持隐私保护和用户撤销的属性基加密方案[J]. 信息网络安全,2017,17(6):14-21.
|
[3] |
HAN Qingde, XIE Hui, YUAN Zhimin, et al.A MA-CP-ABE Scheme of Supporting Access Structure Hiding[J]. Netinfo Security, 2017, 17(1): 48-56.
|
|
韩清德,谢慧,袁志民,等. 一种支持访问结构隐藏的MA-CP-ABE方案[J]. 信息网络安全,2017,17(1):48-56.
|
[4] |
CHOR B, FIAT A, NAOR M, et al.Tracing Traitors[J]. IEEE Transactions on Information Theory, 2000, 46(3): 893-910.
|
[5] |
BONEH D, FRANKLIN M.An Efficient Public Key Traitor Tracingscheme[C]//Springer. 1999 Annual International Cryptology Conference, August 15-19, 1999, Santa Barbara, CA, USA. Heidelberg: Springer, 1999: 338-353.
|
[6] |
GOYAL V.Reducing Trust in the PKG in Identity Based Cryptosystems[C]//Springer. 27th Annual International Cryptology Conference on Advances in Cryptology, August 19-23, 2007, Santa Barbara, CA, USA. Heidelberg: Springer, 2007: 430-447.
|
[7] |
HINEK M J, JIANG Shaoquan, SAFAVI-NAINI R, et al.Attribute-based Encryption with Key Cloning Protection[J]. Bulletin of the Korean Mathematical Society, 2008(4): 803-819.
|
[8] |
YU Shucheng, REN Kui, LOU Wenjing, et al.Defending Against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems[C]//Springer. 2009 International Conference on Security and Privacy in Communication Systems, September 14-18, 2009, Athens, Greece. Heidelberg: Springer, 2009: 311-329.
|
[9] |
LIU Zhen, CAO Zhenfu, WONG D S. Blackbox Traceable CP-ABE: How to Catch People Leaking Their Keys by Selling Decryption Devices on Ebay[EB/OL]. , 2017-11-10.
|
[10] |
LIU Zhen, CAO Zhenfu, WONG D S.White-Box Traceable Ciphertext-policy Attribute-based Encryption Supporting Any Monotone Access Structures[J]. IEEE Transactions on Information Forensics & Security, 2013, 8(1): 76-88.
|
[11] |
NING Jianting, CAO Zhenfu, DONG Xiaolei, et al.Large Universe Ciphertext-policy Attribute-based Encryption with White-box Traceability[C]//Springer. 19th European Symposium on Research in Computer Security, September 7-11, 2014, Wroclaw, Poland. Heidelberg: Springer, 2014: 55-72.
|
[12] |
NING Jianting, DONG Xiaolei, CAO Zhenfu, et al.White-box Traceable Ciphertext-policy Attribute-based Encryption Supporting Flexible Attributes[J]. IEEE Transactions on Information Forensics & Security, 2015, 10(6): 1274-1288.
|
[13] |
NING Jianting, CAO Zhenfu, DONG Xiaolei, et al. Traceable and Revocable CP-ABE with Shorter Ciphertexts[EB/OL]. , 2018-2-11.
|
[14] |
JIANG Yinhao, SUSILO W, MU Y, et al.Ciphertext-policy Attribute-based Encryption Against Key-delegation Abuse in Fog Computing[J]. Future Generation Computer Systems, 2018, 78(P2): 720-729.
|
[15] |
ZHANG K, LI Hui, MA Jianfeng, et al. Efficient Large-universe Multi-authority Ciphertext-policy Attribute-based Encryption with White-box Traceability[EB/OL]. , 2018-2-11.
|
[16] |
IBRAIMI L, TANG Qiang, HARTEL P, et al.Efficient and Provable Secure Ciphertext-policy Attribute-based Encryption Schemes[C]//Springer. 2009 International Conference on Information Security Practice and Experience, April 13-15, 2009, Xi’an, China. Heidelberg: Springer, 2009: 1-12.
|
[17] |
BONEH D, BOYEN X.Short Signatures without Random Oracles[C]//Springer. 2004 International Conference on the Theory and Applications of Cryptographic Techniques, May 2-6, 2004, Interlaken, Switzerland. Heidelberg: Springer, 2004: 56-73.
|