Computer Science ›› 2016, Vol. 43 ›› Issue (2): 175-178.doi: 10.11896/j.issn.1002-137X.2016.02.038
Previous Articles Next Articles
WANG Hai-ping and ZHAO Jing-jing
[1] Sahai A,Waters B.Fuzzy identity-based encryption[C]∥Advances in Cryptology-EUROCRYPT 2005.Berlin:Springer Berlin Heidelberg,2005:457-473 [2] Goyal V,Pandey O,Sahai A,et al.Attribute-based encryption for fine-grained access control of encrypted data[C]∥ Procee-ding of the 13th ACM Conference on Computer and Communications Security (ACM CSS 2006).New York:ACM New York,2006:89-98 [3] Bethencourt J,Sahai A,Waters B.Ciphertext-policy attribute-based encryption[C]∥ IEEE Symposium on Security and Privacy 2007 (SP 2007).Piscataway:IEEE,2006:321-334 [4] Cheung L,Newport C.Provably secure ciphertext policy ABE[C]∥14th ACM Conference on Computer and Communications Security (ACM CSS 2007).New York:ACM,2007:456-465 [5] Lbraimi L,Tang Q,Hartel P,et al.Efficient and provably secure ciphertext-policy attribute-based encryption schemes[C]∥Information Security Practice and Experience.Berlin:Springer Berlin Heidelberg,2009:1-12 [6] Kapadia A,Tsang P P,Smith S W.Attribute-based publishingwith hidden credentials and hidden policies[C]∥Proceedings USA of 14th Annual Network & Distributed System Security Symposium (NDSS 2007).San Diego,California,USA:NDSS,2007:179-192 [7] Boneh D,Waters B.Conjunctive,subset,and range queries on encrypted data[C]∥4th Theory of Cryptography Conference.Berlin:Springer Berlin Heidelberg,2007:535-554 [8] Nishide T,Yoneyama K,Ohta K.Attribute-based encryptionwith partially hidden encryptor-specified access structures[C]∥6th International Conference on Applied Cryptography and Network Security.Berlin:Springer Berlin Heidelberg,2008:111-129 [9] Müller S,Katzenbeisser S.Hiding the policy in cryptographic access control[M]∥ Security and Trust Management.Berlin:Springer Berlin Heidelberg,2012:90-105 [10] Xu R,Wang Y,Lang B.A Tree-Based CP-ABE Scheme with Hidden Policy Supporting Secure Data Sharing in Cloud Computing[C]∥2013 International Conference on Advanced Cloud and Big Data (CBD).Piscataway:IEEE,2013:51-57 [11] Lai J Z,Deng R H,Li Y J.Fully secure ciphertext-policy hiding CP-ABE[C]∥7th International Conference on Information Security Practice and Experience.Berlin:Springer Berlin Heidelberg,2011:24-39 [12] Waters B.Dual system encryption:realizing fully secure IBE and HIBE under simple assumptions[C]∥Advances in Cryptology-CRYPTO 2009(009).Berlin:Springer Berlin Heidelberg,2011:619-636 [13] Emura K,Miyaji A,Nomura A,et al.A ciphertext-policy attri-bute-based encryption scheme with constant ciphertext length[C]∥5th International Conference on Information Security Practice and Experience.Berlin:Springer Berlin Heidelberg,2009:13-23 [14] Zhou Z B,Huang D J.On efficient ciphertext-policy attribute-based encryption and broadcast encryption extended abstract[C]∥ Proceedings of the 17th ACM Conference on Computer and Communications Security.New York:ACM,2010:753-755 [15] Rao Y S,Dutta R.Recipient anonymous ciphertext-policy attri-bute based encryption[C]∥9th Internatonal Conference on Information Systems Security.Berlin:Springer Berlin Heidelberg, 2013:329-344 [16] Zhang M,Wang X A,Yang X,et al.Efficient Predicate Encryption Supporting Construction of Fine-Grained Searchable Encryption[C]∥ 2013 5th International Conference on Intelligent Networking and Collaborative Systems (INCoS).Piscataway:IEEE,2013:438-442 [17] Padhya M,Jinwala D.A Novel Approach for Searchable CP-ABE with Hidden Ciphertext-Policy[C]∥ 10th International Conference on Information Systems Security.Berlin:Springer Berlin Heidelberg,2014:167-184 |
No related articles found! |
|