[1] Sahai A, Waters B. Fuzzy identity-based encryption[J]. Lecture Notes in Computer Science, 2015,3494:457-473.
[2] Goyal V, Pandey O, Sahai A, et al. Attribute-based encryption for fine-grained access control of encrypted data[C]// ACM Conference on Computer and Communications Security. 2006:89-98.
[3] Bethencourt J, Sahai A, Waters B. Ciphertext-policy attribute-based encryption [C]// IEEE Symposium on Security and Privacy. 2007:321-334.
[4] Green M, Hohenberger S, Waters B. Outsourcing the decryption of ABE ciphertexts[C]// Proceedings of the 20th USENIX Conference on Security. 2011:34.
[5] Waters B. Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization[C]// Proceedings of the 14th International Conference on Prectice and Theory in Public Key Cryptography. 2011:53-70.
[6] Cheung L, Newport C. Provably secure ciphertext policy ABE[C]// ACM Conference on Computer and Communications Security. 2007:456-465.
[7] Luan I, Tang Q, Hartel P, et al. Efficient and provable secure ciphertext-policy attribute-based encryption schemes[C]// Proceedings of International Conference on Information Security Practice and Experience. 2009:1-12.
[8] Yu Shucheng, Ren Kui, Lou Wenjing. Attribute-based content distribution with hidden policy[C]// Workshop on Secure Network Protocols, 2008. 2008:39-44.
[9] Frikken K, Atallah M, Li J. Attribute-based access control with hidden policies and hidden credentials[J]. IEEE Transactions on Computers, 2006,55(10):1259-1270.
[10]Lai Junzuo, Deng R H, Li Yingjiu. Expressive CP-ABE with partially hidden access structures[C]// Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security. 2012:18-19.
[11]Wan Zhiguo, Liu J, Deng R H. HASBE: A hierarchical attribute-based solution for flexible and scalable access control in cloud computing[J]. IEEE Transactions on Information Forensics & Security, 2012,7(2):743-754.
[12]Lewko A, Okamoto T, Sahai A, et al. Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption[C]// Proceedings of the 29th Annual International Conference on Theory and Applications of Cryptographic Techniques. 2010:62-91.
[13]Chase M, Chow S S M. Improving privacy and security in multi-authority attribute-based encryption[C]// ACM Conference on Computer and Communications Security. 2009:121-130.
[14]Li Wei, Xue Kaiping, Xue Yingjie, et al. TMACS: A robust and verifiable threshold multi-authority access control system in public cloud storage[J]. IEEE Transactions on Parallel & Distributed Systems, 2016,27(5):1484-1496.
[15]Lai Junzuo, Deng R H, Guan Chaowen, et al. Attribute-based encryption with verifiable outsourced decryption[J]. IEEE Transactions on Information Forensics & Security, 2013,8(8):1343-1354.
[16]Li Jin, Huang Xinyi, Li Jingwei, et al. Securely outsourcing attribute-based encryption with check ability[J]. IEEE Transactions on Parallel & Distributed Systems, 2014,25(8):2201-2210.
[17]Lin Suqing, Zhang Rui, Ma Hui, et al. Revisiting attribute-based encryption with verifiable outsourced decryption[J]. IEEE Transactions on Information Forensics & Security, 2015,10(10):2119-2130.
[18]Qin Baodong, Deng R H, Liu Shengli, et al. Attribute-based encryption with efficient verifiable outsourced decryption[J]. IEEE Transactions on Information Forensics & Security, 2015,10(7):1384-1393.
[19]Mao Xianping, Lai Junzuo, Mei Qixiang, et al. Generic and efficient constructions of attribute-based encryption with verifiable outsourced decryption[J]. IEEE Transactions on Dependable & Secure Computing, 2016,13(5):533-546.
[20]Dan B, Katz J. Improved efficiency for CCA-secure cyptosystems built using identity-based encryption[C]// Proceedings of the 2005 International Conference on Topics in Cryptology. 2005:87-103.
[21]Yamada S, Attrapadung N, Hanaoka G, et al. Generic constructions for chosen-ciphertext secure attribute based encryption[C]// Proceedings of the 14th International Conference on Practice and Theory in Public Key Cryptography. 2011:71-89.
|