共 22 条
- [1] SAHAI A, WATERS B., Fuzzy identity-based encryption, Proceedings of the 24th Annual International Conference on Theory and Applications of Cryptographic Techniques, pp. 457-473, (2005)
- [2] GOYAL V, PANDEY O, SAHAI A, Et al., Attribute-based encryption for fine-grained access control of encrypted data, Proceedings of the 13th ACM Conference On Computer And Communications Security, pp. 89-98, (2006)
- [3] BETHENCOURT J, SAHAI A, WATERS B., Ciphertext-policy attribute-based encryption, 2007 IEEE Symposium on Security and Privacy, pp. 321-334, (2007)
- [4] WATERS B., Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization, International Workshop on Public Key Cryptography, pp. 53-70, (2011)
- [5] BALU A, KUPPUSAMY K., An expressive and provably secure ciphertext-policy attribute-based encryption, Information Sciences, 276, pp. 354-362, (2014)
- [6] LIANG X H, CAO Z F, LIN H, Et al., Attribute based proxy re-encryption with delegating capabilities, Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, pp. 276-286, (2009)
- [7] LUO S, HU J B, CHEN Z., Ciphertext policy attribute-based proxy re-encryption, International Conference on Information and Communications Security, pp. 401-415, (2010)
- [8] LI J J, LIU Z H, ZU L H., Chosen-ciphertext secure multi-use unidirectional attribute-based proxy re-encryptions, 2014 Ninth Asia Joint Conference on Information Security, pp. 96-103, (2014)
- [9] KAWAI Y., Outsourcing the re-encryption key generation: flexible ciphertext-policy attribute-based proxy re-encryption, Information Security Practice and Experience, pp. 301-315, (2015)
- [10] LIANG K T, AU M H, LIU J K, Et al., A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing, Future Generation Computer Systems, 52, pp. 95-108, (2015)