共 19 条
[1]
Fully secure multi-authority ciphertext-policy attribute-based encryption without random oracles. Liu Z,Cao Z F,Huang Q,et al. Computer Security-ESORICS 2011 . 2011
[2]
Tools for Simulating Features of Composite Order Bilinear Groups in the Prime Order Setting. Lewko A. Advances in Cryptology-EUROCRYPT’’2012 . 2012
[3]
Attribute-Based Encryption with Non-Monotonic Access Structures. R Ostrovsky,B Waters. Proceedings of the 14th ACM conference on Computer . 2007
[4]
Improving privacy and security in multi-authority attribute-based encryption. CHASE M,CHOW S S M. CCS2009 . 2009
[5]
Attribute-based encryption for fine-grained access control of encrypted data. Goyal V,Pandey O,Sahai A,Waters B. Proc.of the13th ACM conference on Computer and communications security . 2006
[6]
Identity-based encryption from the Weil pairing. Boneh D,Franklin M. Proceeding of Advances in Cryptology-Crypto’2001 . 2001
[7]
Bounded ciphertext policy attributebased encryption. Vipul Goyal,Abhishek Jain,Omkant Pandey,Amit Sahai. ICALP (2) . 2008
[8]
Unbounded HIBE and attribute-based encryption. Lewko A,Waters B. Advances in Cryptology-EUROCRYPT 2011 . 2011
[9]
Converting pairing-based cryptosystems from composite-order groups to prime-order groups. FREEMAN D M. EUROCRYPT 2010 . 2010
[10]
Distributed Attribute-Based Encryption. Sascha Muller,Stefan Katzenbeisser,Claudia Eckert. Information Security andCryptology - ICISC 2008 - 11th International Conference, Revised Selected Papers . 2009