Computer Science ›› 2016, Vol. 43 ›› Issue (Z6): 357-360.doi: 10.11896/j.issn.1002-137X.2016.6A.085
Previous Articles Next Articles
DING Xiao-hong, QIN Jing-yuan and WANG Xin
[1] Sahai A,Waters B.Fuzzy identity-based encryption[M]∥Cramer R,ed.EUROCRYPT 2005.Springer,Heidelberg,2005:457-473 [2] Goyal V,Pandey O,Sahai A,et al.Attribute-based encryption for fine grained access control of encrypted data[C]∥ ACM Conference on Computer and Communications Security.2006:89-98 [3] Waters B.Ciphertext-Policy Attribute-Baded Encryption:An Ex-pressive,Efficient,and Provably Secure Realization[C]∥Public Key Cryptography(PKC 2011).2011:53-70 [4] 马丹丹,陈勤,党正芹,等.基于多属性机构的密文策略和加密机制[J].计算机工程,2012,38(10):114-116 [5] Lai Lun-zuo,Deng R H,Guan Chao-wen, et al.Attribute-Based Encryption With Verifiable Outsourced Decryption[J].IEEE Transactions on Information Forensics and Security,2013,8(8):1343-1354 [6] Green M,Hohenberger S,Waters B.Outsourcing the Decryption of ABE Ciphertexts[C]∥Proceedings of the 20th USENIX Conference on Security.2011 [7] Gamal T E.A public key encryptosystem and a signature scheme- based on discrete logarithms[M]∥ Advances in Cryptology:Proceedings of CRYPTO 84.1985:10-18 [8] Goyal V,Pandey O,Sahai A,et al.Attribute-based encryption for fine-grained access control of encrypted data[C]∥ACM Conference on Computer and Communications Security.2006:89-98 [9] 石岳蓉,郭俊,赵晶晶,等.高效数据外包的基于多授权中心的ABE方案[J].信息技术,2015(2):97-100 [10] Beimel A.Secure Schemes for Secret Sharing and Key Distribution [D].Israel Institute of Technology,Technion,Haifa,Is-rael,1996 |
No related articles found! |
|