[1] GOYAL V,PANDEY O,SAHAI A,et al.Attribute-based encryption for fine-grained access control of encrypted data[A].Proceedings of the 13th ACM Conference on Computer and Communications Security[C].USA:ACM,2006.89-98.
[2] 宋衍,韩臻,等.基于访问树的策略隐藏属性加密方案[J].通信学报,2015,36(9):1351-1358. SONG Yan,HAN Zhen,et al.Encryption scheme for policy-based hidden attributes based on access tree[J].Journal on Communications,2015,36(9):1351-1358.(in Chinese)
[3] 刘梦君,刘树波,等.基于LSSS共享矩阵无授权策略的属性密码解密效率提高方案[J].电子学报,2015,43(6):1065-1072. LIU Meng-jun,LIU Shu-bo,et al.A scheme for improving the decryption efficiency of attribute passwords based on the LSSS shared matrix unauthorized policy[J].Acta Electronica Sinica,2015,43(6):1065-1072.(in Chinese)
[4] Cheng Y,Zhou H,Ma J,Wang Z.Efficient CP-ABE with non-monotonic access structures[A].International Conference on Cloud Computing and Security(vol.10603)[C].Berlin:Springer,2017.315-325.
[5] 胡鹏,高海英.一种实现一般电路的密钥策略的属性加密方案[J].软件学报,2016,27(6):1498-1510. HU Peng,GAO Hai-ying.An attribute-based encryption scheme for implementing key strategies for general circuits[J].Journal of Software,2016,27(6):1498-1510.(in Chinese)
[6] Guo Yuyan,Li Jiguo,Zhang Yichen,et al.Hierarchical attribute-based encryption with continuous auxiliary inputs leakage[J].Security and Communication Networks,2016,9(18):4852-4862.
[7] 赵志远,朱智强,等.属性可撤销且密文长度恒定的属性基加密方案[J].电子学报,2018,46(10):2391-2399. ZHAO Zhi-yuan,ZHU Zhi-qiang,et al.Attribute-based encryption scheme with revocable attributes and constant ciphertext length[J].Acta Electronica Sinica,2018,46(10):2391-2399.(in Chinese)
[8] Li Ji-guo,Yao Wei,Zhang Yichen,et al.Flexible and fine-grained attribute-based data storage in cloud computing[J].IEEE Transactions on Services Computing,2016,10(5):785-796.
[9] 李琦,马建峰,等.一种素数阶群上构造的自适应安全的多授权机构CP-ABE方案[J].电子学报,2014,42(4):696-702. LI Qi,MA Jian-feng,et al.A CP-ABE scheme with adaptive security and multi-authorization mechanism constructed on prime order group[J].Acta Electronica Sinica,2014,42(4):696-702.(in Chinese)
[10] Karchmer M,Wigderson A.On span programs[A].Proceedings of the Eighth Annual Structure in Complexity Theory Conference[C].USA:IEEE,1993.102-111.
[11] Ishai Y,Wee H.Partial garbling schemes and their applications[A].International Colloquium on Automata,Languages,and Programming(Part I,volume 8572)[C].Berlin,Heidelberg:Springer,2014.650-662.
[12] Attrapadung N,Hanaoka G,Yamada S.Conversions among several classes of predicate encryption and applications to ABE with various compactness tradeoffs[A].International Conference on the Theory and Application of Cryptology and Information Security(volume 9452)[C].Berlin,Heidelberg:Springer,2015.575-601.
[13] Chen J,Gong J,Kowalczyk L,et al.Unbounded ABE via bilinear entropy expansion,revisited[A].Annual International Conference on the Theory and Applications of Cryptographic Techniques(volume 10820)[C].Berlin,Heidelberg:Springer,2018.503-534.
[14] Chen J,Gay R,Wee H.Improved dual system ABE in prime-order groups via predicate encodings[A].Annual International Conference on the Theory and Applications of Cryptographic Techniques (volume 9057)[C].Berlin,Heidelberg:Springer,2015.595-624.
[15] Lewko A.Tools for simulating features of composite order bilinear groups in the prime order setting[A].Annual International Conference on the Theory and Applications of Cryptographic Techniques(volume 7237)[C].Berlin,Heidelberg:Springer,2012.318-335.
[16] Okamoto T,Takshima K.Fully secure functional encryption with general relations from the decisional linear assumption[A].Annual Cryptology Conference(volume 6223)[C].Berlin,Heidelberg:Springer,2010.191-208.
[17] Chen J,Wee H.Dual systems groups and its applications-compact HIBE and more-Cryptology ePrint Archive[R].2014/265.
[18] Lewko A B,Waters B.New techniques for dual system encryption and fully secure HIBE with short ciphertexts[A].Theory of Cryptography Conference(volume 5978)[C].Berlin,Heidelberg:Springer,2010.455-479. |