共 23 条
- [11] Waters B., Ciphertext-Policy attribute-based encryption: An expressive, efficient, and provably secure realization, Proc. of the Public Key Cryptography (PKC 2011), pp. 53-70, (2011)
- [12] Green M, Hohenberger S, Waters B., Outsourcing the decryption of ABE ciphertexts, Proc. of the 20th Usenix Conf. on Security, pp. 34-34, (2011)
- [13] Li J, Jia C, Li J, Et al., Outsourcing encryption of attribute-based encryption with MapReduce, Proc. of the 14th Int'l Conf. on Information and Communications Security, pp. 191-201, (2012)
- [14] Zhou Z, Huang D., Efficient and secure data storage operations for mobile cloud computing, Proc. of the 8th Int'l Conf. on Network and Service Management, pp. 37-45, (2012)
- [15] Lai J, Deng RH, Guan C, Weng J., Attribute-based encryption with verifiable outsourced decryption, IEEE Trans. on Information Forensics and Security, 8, 8, pp. 1343-1354, (2013)
- [16] Qin B, Deng R, Liu S, Ma S., Attribute-Based encryption with efficient verifiable outsourced decryption, IEEE Trans. on Information Forensics and Security, 10, 7, pp. 1384-1393, (2015)
- [17] Lin S, Zhang R, Ma H, Wang M., Revisiting attribute-based encryption with verifiable outsourced decryption, IEEE Trans. on Information Forensics & Security, 10, 10, pp. 2119-2130, (2015)
- [18] Mao X, Lai J, Mei Q, Et al., Generic and efficient constructions of attribute-based encryption with verifiable outsourced decryption, IEEE Trans. on Dependable & Secure Computing, 13, 5, pp. 533-546, (2016)
- [19] Zhang K, Ma J, Liu J, Et al., Adaptively secure multi-authority attribute-based encryption with verifiable outsourced decryption, Science China Information Sciences, 59, 9, pp. 99-105, (2016)
- [20] Liu Z, Jiang ZL, Wang X, Et al., Offline/Online attribute-based encryption with verifiable outsourced decryption, Concurrency & Computation Practice & Experience, (2017)