共 50 条
- [2] Provable Security Analysis on Unbounded Hierarchical Identity-based Encryption and Attribute-based Encryption [J]. 2016 3RD INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND CONTROL ENGINEERING (ICISCE), 2016, : 510 - 513
- [4] Identity-based encryption and hierarchical identity-based encryption [J]. Cryptology Inf. Secur. Ser., 2009, (45-64):
- [5] Multi-party (Leveled) Homomorphic Encryption on Identity-Based and Attribute-Based Settings [J]. INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2017, 2018, 10779 : 71 - 92
- [7] Threshold Identity-Based Broadcast Encryption from Identity-Based Encryption [J]. COMPUTER APPLICATIONS FOR DATABASE, EDUCATION, AND UBIQUITOUS COMPUTING, 2012, 352 : 99 - 102
- [8] Identity-based Access Control for Digital Content based on Ciphertext-Policy Attribute-Based Encryption [J]. 2015 INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2015, : 87 - 91
- [9] Attribute-based Encryption Scheme with Fast Encryption [J]. Feng, Chao-Sheng (csfenggy@126.com), 1600, Chinese Academy of Sciences (31): : 3923 - 3936
- [10] Attribute-Based Encryption for Circuits [J]. STOC'13: PROCEEDINGS OF THE 2013 ACM SYMPOSIUM ON THEORY OF COMPUTING, 2013, : 545 - 554