参考文献
[1]Sahai A,Waters B.Fuzzy Identity-based Encryp-tion[C]//Proceedings of International Conference on Theory & Applications of Cryptographic Techniques.Berlin,Germany:Springer,2005:457-473.
[2]Shamir A.Identity-based Cryptosystems and Signature Schemes[C]//Proceedings of CRYPTO’84.Berlin,Germany:Springer,1984:47-53.
[3]Goyal V,Pandey O,Sahai A,et al.Attribute-based Encryption for Fine-grained Access Control of Encrypted Data[C]//Proceedings of the 13th ACM Conference on Computer and Communications Security.Alexandria,USA:ACM Press,2006:89-98.
[4]Bethencourt J,Sahai A,Waters B.Ciphertext-policy Attribute-based Encryption[C]//Proceedings of IEEE Symposium on Security and Privacy.Washington D.C.,USA:IEEE Press,2007:321-334.
[5]Waters B.Ciphertext-policy Attribute-based Encryption:An Expressive,Efficient,and Provably Secure Realization[C]//Proceedings of International Workshop on Public Key Cryptography.Berlin,Germany:Springer,2011:53-70.
[6]Maji H K,Prabhakaran M,Rosulek M.Attribute-based Signatures[C]//Proceedings of International Conference on Topics in Cryptology.Berlin,Germany:Springer,2011:376-392.
[7]Li Jin,Au M H,Susilo W,et al.Attribute-based Signature and Its Applications[C]//Proceedings of the 5th ACM Symposium on Information,Computer and Communications Security.New York,USA:ACM Press,2010:60-69.
[8]Shahandashti S F,Safavi-Naini R.Threshold Attribute-based Signatures and Their Application to Anonymous Credential Systems[C]//Proceedings of International Conference on Topics in Cryptology.Berlin,Germany:Springer,2009:198-216.
[9]Okamoto T,Takashima K.Efficient Attribute-based Signatures for Non-monotone Predicates in the Standard Model[J].IEEE Transactions on Cloud Computing,2014,2(4):409-421.
[10]Goyal V.Reducing Trust in the PKG in Identity Based Cryptosystems[C]//Proceedings of International Crypto-logy Conference on Advances in Cryptology.Berlin,Germany:Springer,2007:430-447.
[11]Goyal V,Lu S,Sahai A,et al.Black-box Accountable Authority Identity-based Encryption[C]//Proceedings of the 15th ACM Conference on Computer and Communications Security.Alexandria,USA:ACM Press,2008:427-436.
[12]Liu Zhen,CaoZhenfu,Wong D S.White-box Traceable Ciphertext-policy Attribute-based Encryption Supporting Any Monotone Access Structures[J].IEEE Transactions on Information Forensics and Security,2013,8(1):76-88.
[13]Ning Jianting,Dong Xiaolei,Cao Zhenfu,et al.White-box Traceable Ciphertext-policy Attribute-based Encryption Supporting Flexible Attributes[J].IEEE Transactions on Information Forensics and Security,2015,10(6):1274-1288.
[14]Ning Jianting,Cao Zhenfu,Dong Xiaolei,et al.Large Universe Ciphertext-policy Attribute-based Encryption with White-box Traceability[C]//Proceedings of the 19th European Symposium on Research in Computer
Security.Berlin,Germany:Springer,2014:55-72.
(下转第140页)
(上接第132页)
[15]Escala A,Herranz J,Morillo P.Revocable Attribute-based Signatures with Adaptive Security in the Standard Model[C]//Proceedings of International Conference on Progress in Cryptology in Africa.Berlin,Germany:Springer,2011:224-241.
[16]张秋璞,徐震,叶顶峰.一个可追踪身份的基于属性签名方案[J].软件学报,2012,23(9):2449-2464.
[17]Ding Shenglong,Zhao Yiming,Liu Yuyang.Efficient Traceable Attribute-based Signature[C]//Proceedings of the 13th International Conference on Trust,Security and Privacy in Computing and Communications.Washington D.C.,USA:IEEE
Press,2014:582-589.
[18]Boneh D,Boyen X.Short Signatures Without Random Oracles[C]//Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques.Berlin,Germany:Springer,2004:56-73.
编辑顾逸斐 |