参考文献
[1] Bethencourt J, Sahai A, Waters B. Ciphertext-policy Attribute- based Encryption[C]//Proc. of the 28th IEEE Symposium on Security and Privacy. Oakland, USA: [s. n.], 2007: 321-334.
[2] Goyal V, Pandey O, Sahai A, et al. Attribute-based Encryption for Fine-grained Access Control of Encrypted Data[C]//Proc. of CCS’06. New York, USA: ACM Press, 2006: 89-98.
[3] Sahai A, Waters B. Fuzzy Identity-based Encryption[C]//Proc. of EUROCRYPT’05. Aarhus, Denmark: Springer-Verlag, 2005: 457-473.
[4] Cheung L. Provably Secure Ciphertext Policy ABE[C]//Proc. of ACM Conference on Computer and Communications Security. New York, USA: ACM Press, 2007: 456-465.
[5] Goyal V, Jain A, Pandey O, et al. Bounded Ciphertext Policy Attribute-based Encryption[C]//Proc. of ICALP’08. Berlin, Germany: Springer-Verlag, 2008: 579-591.
[6] Bethencourt J, Sahai A, Waters B. Ciphertext-policy Attribute- based Encryption[C]//Proc. of IEEE Symposium on Security and Privacy. Pittsburgh, USA: [s. n.], 2007: 321-334.
[7] Pirretti M, Traynor P, McDaniel P, et al. Secure Attribute Based Systems[C]//Proc. of the 13th ACM Conference on Computer and Communications Security. New York, USA: ACM Press, 2006: 99-112.
[8] Ostrovsky R, Sahai A, Waters B. Attribute Based Encryption with Non-monotonic Access Structures[C]//Proc. of ACM Conference on Computer and Communications Security. New York, USA: ACM Press, 2007: 195-203.
[9] 陈少真, 王文强, 彭书娟. 高效的基于属性的环签名方 案[J]. 计算机研究与发展, 2010, 47(12): 2075-2082.
[10] 孙昌霞, 马文平, 陈和风. 多授权中心的基于属性的签 名[J]. 四川大学学报: 工程科学版, 2011, 43(1): 83-86.
[11] Lee B, Kim K. Fair Exchange of Digital Signatures Using Conditional Signature[C]//Proc. of Symposium on Cryptogra- phy and Information Security. Shirahama, Japan: [s. n.], 2002: 179-184.
[12] Marek K, Miros?aw K, Anna L. Conditional Digital Signa- tures[C]//Proc. of the 2nd International Conference on Trust, Privacy, and Security in Digital Business. Berlin, Germany: Springer-Verlag, 2005: 206-215.
编辑 任吉慧 |