参考文献
[1]Sahai A,Waters B.Fuzzy Iidentity-based Encryp-tion[C]//Proceedings of Advances in Cryptology-EUROCRYPT’05.Berlin,Germany:Springer-Verlag,2005:457-473.
[2]Goyal V,Pandey O,Sahai A,et al.Attribute-based Encryption for Fine-grained Access Control of Encrypted Data[C]//Proceedings of the 13th ACM Conference on Computer and Communications Security.New York,USA:ACM Press,2006:89-98.
[3]Bethencourt J,Sahai A,Waters B.Ciphertext-policy Attribute-based Encryption[C]//Proceedings of 2007 IEEE Symposium on Security and Privacy.Washington D.C.,USA:IEEE Computer Society,2007:321-334.
[4]邓宇乔.基于动态属性的加密方案[J].计算机工程,2014,40(4):136-140.
[5]Hinek J,Jiang S,Safavi R,et al.Attribute-based Encryption with Key Cloning Protection[J].Bulletin of the Korean Mathematical Society,2008(4):803-819.
[6]Yu Shucheng,Ren Kui,Lou Wenjing,et al.Defending Against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems[C]//Proceedings of Conference on Security and Privacy in Communication Networks.Berlin,Germany:Springer-Verlag,2009:311
-329.
[7]Li Jin,Ren Kui,Zhu Bo,et al.Privacy-aware Attribute-based Encryption with User Accountability[C]// Proceedings of Information Security Conference.Berlin,Germany:Springer-Verlag,2009:347-362.
[8]Wang Yongtao,Chen Kefei,Chen Jianhong.Attribute-based Traitor Tracing[J].Journal of Information Science and Engineering,2011,27(1):181-195.
[9]Ostrovsky R,Sahai A,Waters B.Attribute Based Encryption with Non-monotonic Access Structures[C]// Proceedings of the 14th ACM Conference on Computer and Communication Security.New York,USA:ACM Press,2007:195-203.
[10]马海英,曾国荪.可追踪并撤销叛徒的属性基加密方案[J].计算机学报,2012,35(9):1845-1855.
[11]Emura K,Miyaji A,Nomura A,et al.A Ciphertext-policy Attribute-based Encryption Scheme with Constant Ciphertext Length[C]//Proceedings of Conference on Information Security Practice and Experience.Berlin,Germany:Springer-
Verlag,2009:13-23.
[12]Chen Cheng,Zhang Zhenfeng,Feng Dengguo.Efficient Ciphertext Policy Attribute-based Encryption with Constant-size Ciphertext and Constant Computation-cost[C]//Proceedings of Conference on Provable Security.Berlin,Germany:Springer
-Verlag,2011:84-101.
[13]Herranz J,Laguillaumie F,Ràfols C.Constant Size Ciphertexts in Threshold Attribute-based Encryp-tion[C]//Proceedings of PKC’10.Berlin,Germany:Springer-Verlag,2010:19-34.
[14]Attrapadung N,Libert B,de Panafieu E.Expressive Key-policy Attribute-based Encryption with Constant-size Ciphertexts[C]//Proceedings of PKC’11.Berlin,Germany:Springer-Verlag,2011:90-108.
[15]Hohenberger S,Waters B.Attribute-based Encryption with Fast Decryption[C]//Proceedings of Public-key Cryptography-PKC’13.Berlin,Germany:Springer-Verlag,2013:162-179.
[16]Naor D,Naor M,Lotspiech J.Revocation and Tracing Schemes for Stateless Receivers[C]//Proceedings of Advances in Cryptology-Crypto’01.Berlin,Germany:Springer-Verlag,2001:41-62.
[17]Boneh D,Franklin M.Identity-based Encryption from the Weil Pairing[C]//Proceedings of Advances in Cryptology-Crypto’01.Berlin,Germany:Springer-Verlag,2001:213-229.
[18]Beimel A.Secure Schemes for Secret Sharing and Key Distribution[D].Haifa,Israel:Israel Institute of Tech-nology,1996.
[19]Dan B,Xavier B,Eujin G.Hierarchical Identity Based Encryption with Constant Size Ciphertext[C]//Proceedings of Advances in Cryptology-Eurocrypt’05.Berlin,Germany:Springer-Verlag,2005:440-456.
[20]Waters B.Dual System Encryption:Realizing Fully Secure IBE and HIBE Under Simple Assumptions[C]// Proceedings of Advances in Cryptology-Crypto’09.Berlin,Germany:Springer-Verlag,2009:619-636.
编辑索书志 |