共 50 条
- [1] An attribute-based encryption scheme for traitor tracing and revocation together Jisuanji Xuebao/Chinese Journal of Computers, 2012, 35 (09): : 1845 - 1855
- [2] Practical Attribute-Based Encryption: Traitor Tracing, Revocation and Large UniverseaEuro COMPUTER JOURNAL, 2016, 59 (07): : 983 - 1004
- [3] Traitor-Tracing from LWE Made Simple and Attribute-Based THEORY OF CRYPTOGRAPHY, TCC 2018, PT II, 2018, 11240 : 341 - 369
- [4] Generic Codes Based Traitor Tracing and Revoking Scheme from Attribute-Based Encryption 2014 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY (CIT), 2014, : 299 - 306
- [5] Attribute-Based Signatures with Advanced Delegation, and Tracing TOPICS IN CRYPTOLOGY, CT-RSA 2024, 2024, 14643 : 224 - 248
- [6] Secured tracing for group signatures from attribute-based encryption CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023,
- [7] Tracing Malicious Insider in Attribute-Based Cloud Data Sharing Jisuanji Xuebao/Chinese Journal of Computers, 2022, 45 (07): : 1431 - 1445
- [8] Attribute based Encryption: Traitor Tracing, Revocation and Fully Security on Prime Order Groups CLOSER: PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND SERVICES SCIENCE, 2017, : 281 - 292
- [9] Auditable Attribute-Based Credentials Scheme and Its Application in Contact Tracing APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2024, PT I, 2024, 14583 : 88 - 118
- [10] Using attribute-based access control to enable attribute-based messaging 22ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2006, : 403 - +