共 18 条
- [1] Sahai A., Waters B., Fuzzy identity-based encryption, EUROCRYPT, pp. 457-473, (2005)
- [2] Goyal V., Pandey O., Sahai A., Et al., Attribute-based encryption for fine-grained access control of encrypted data, The 13th ACM Conference on Computer and Communications Security, pp. 89-98, (2006)
- [3] Bethencourt J., Sahai A., Waters B., Ciphertext-policy attribute-based encryption, The IEEE Symposium on Security and Privacy, pp. 321-334, (2007)
- [4] Chase M., Multi-authority attribute based encryption, TCC, pp. 515-534, (2007)
- [5] Yang K., Jia X., Expressive, efficient and revocable data access control for multi-authority cloud storage, IEEE Transactions on Parallel and Distributed Systems, 25, 7, pp. 1735-1744, (2014)
- [6] Huang X., Tao Q., Qin B., Et al., Multi-authority attribute based encryption scheme with revocation, The 24th International Conference on Computer Communication and Networks, pp. 1-5, (2015)
- [7] Cui H., Deng R.H., Revocable and decentralized attribute-based encryption, The Computer Journal, (2016)
- [8] Waters B., Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization, PKC, pp. 53-70, (2011)
- [9] Lewko A., Waters B., Unbounded HIBE and attribute-based encryption, EUROCRYPT, pp. 547-567, (2011)
- [10] Rouselakis Y., Waters B., Efficient statically-secure large-universe multi-authority attribute-based encryption, Financial Cryptography and Data Security, pp. 315-332, (2015)