参考文献
[1]Sahai A,Waters B.Fuzzy Identity-based Encryption[C]//Proceedings of EUROCRYPT’05.Aarhus,Denmark:Springer,2005:457-473.
[2]Boneh D,Franklin M K.Identity-based Encryption from the Weil Pairing[C]//Proceedings of CRYPTO’01.Santa Barbara,USA:Springer,2001:213-229.
[3]Goyal V,Pandey O,Sahai A,et al.Attribute-based Encryption for Fine-grained Access Control of Encrypted Data[C]//Proceedings of ACM Conference on Computer and Communications Security.Alexandria,USA:ACM Press,2006:89-98.
[4]Fiat A,Naor M.Broadcast Encryption[C]//Proceedings of CRYPTO’93.Santa Barbara,USA:Springer,1993:480-491.
[5]Waters B.Ciphertext-policy Attribute-based Encryption:An Expressive,Efficient,and Provably Secure Reali-zation[C]//Proceedings of CRYPTO’11.Taormina,Italy:Springer,2011:53-70.
(下转第176页)
(上接第170页)
[6]Lewko A B,Okamoto T,Sahai A,et al.Fully Secure Functional Encryption:Attribute-based Encryption and(Hierarchical) Inner Product Encryption[C]//Proceedings of EUROCRYPT’10.Nice,France:Springer,2010:62-91.
[7]Allison B.Lewko and Brent Waters.New Proof Methods for Attribute-based Encryption:Achieving Full Security Through Selective Techniques[C]//Proceedings of CRYPTO’12.Santa Barbara,USA:Springer,2012:180-198.
[8]Cheung L,Newport C C.Provably Secure Ciphertext Policy ABE[C]//Proceedings of ACM Conference on Computer and Communications Security.Alexandria,USA:ACM Press,2007:456-465.
[9]Garg S,Gentry C,Halevi S,et al.Attribute-based Encryption for Circuits from Multilinear Maps[C]//Proceedings of CRYPTO’13.Santa Barbara,USA:Springer,2013:479-499.
[10]Herranz J,Laguillaumie F,R`afols C.Constant Size Ciphertexts in Threshold Attribute-based Encryption[C]//Proceedings of Public Key Cryptography Conference.Paris,France:Springer,2010:19-34.
[11]Attrapadung M,Libert B,de Panafieu E.Expressive Key-policy Attribute-based Encryption with Constant-size Ciphertexts[C]//Proceedings of Public Key Cryptography Conference.Taormina,Italy:Springer:90-108.
[12]Yu Shucheng,Ren Kui,Lou Wenjing,et al.Defending Against Key Abuse Attacks in Kp-abe Enabled Broadcast Systems[C]//Proceedings of Security and Privacy in Communication Networks Conference.Athens,Greece:Springer,2009:311-329.
[13]Wang Yongtao,Chen Kefei,et al.Attribute-based Traitor Tracing[J].Journal of Information Science and Engineering,2011,27(1):181-195.
[14]Liu Zhen,Cao Zhenfu,Wong D S.White-box Traceable Ciphertext-policy Attribute-based Encryption Supporting any Monotone Access Structures[J].IEEE Transactions on Information Forensics and Security 2013,8(1):76-88.
[15]Liu Zhen,Cao Zhenfu,Wong D S.Blackbox Traceable CP-ABE:How to Catch People Leaking Their Keys by Selling Decryption Devices on eBay[C]//Proceedings of ACM Conference on Computer and Communications Security.Berlin,Germany:ACM
Press,2013:475-486.
[16]马海英,曾国荪.可追踪并撤销叛徒的属性基加密方案[J].计算机学报,2012,35(9):1845-1855.
[17]冯登国,陈成.属性加密学研究[J].密码学报,2014,1(1):1-12.
[18]Liber B,Vergnaud D.Towards Practical Black-box Accoun-table Authority IBE:Weak Black-box Traceability with Short Cipher Texts and Private Keys[J].IEEE Transactions on Information Theory,2011,57(10):7189-7204.
编辑索书志 |