Computer Science ›› 2014, Vol. 41 ›› Issue (4): 150-154.
Previous Articles Next Articles
CHEN Yan-li,DU Ying-jie and YANG Geng
[1] Diffie W,Hellman M.New directions in cryptography [J].IEEE Transactions on Information Theory,1976,2(6):644-654 [2] Sahai A,Waters B.Fuzzy identity-based encryption[M]∥Ad-vances in Cryptology-EUROCRYPT2005.Springer Berlin Heidelberg,2005:457-473 [3] Bethencourt J,Sahai A,Waters B.Ciphertext-policy attribute-based encryption[C]∥Proceedings-IEEE Symposium on Security and Privacy.Berkeley,CA,United states,2007:321-334 [4] Cheung L,Newpor C.Provably secure ciphertext policy ABE[C]∥Proceedings of the ACM Conference on Computer and Communications Security.Alexandria,VA,United states,2007:456-465 [5] Waters B.Ciphertext-policy attribute-based encryption:An expressive,efficient,and provably secure realization[C]∥14th International Conference on Practice and Theory in Public Key Cryptography,PKC 2011.Taormina,Italy,2011:53-70 [6] Ge Ai-jun,Zhang Rui,Chen Cheng,et al.Threshold Ciphertext Policy Attribute-Based Encryption with Constant Size Ciphertexts[C]∥17th Australasian Conference on Information Security and Privacy,ACI SP2012.Wollongong,NSW,Australia,2012,2:336-349 [7] Attrapadung N,Herranz J,Laguillaumie F,et al.Attribute-based encryption schemes with constant size ciphertexts[J].Theoretical Computer Science,2012,2:15-38 [8] Hohenberger S,Waters B.Attribute-Based Encryption with Fast Decryption[M]∥Public-Key Cryptography PKC2013.Springer Berlin Heidelberg,2013:162-179 [9] Wang Hao,Xu Qiu-liang,Ban Tao.A provably secure two-partyattribute-based key agreement protocol[C]∥Intelligent Information Hiding and Multimedia Signal Processing,2009.IIH-MSP’ 09.Fifth International Conference on.IEEE,2009:1042-1045 [10] Wang Hao,Xu Qiu-Liang,Fu Xiu.Two-party attribute-basedkey agreement protocol in the standard model[C]∥Proceedings of the 2009International Symposium on Information Processing (ISIP 2009).2009:325-328 [11] Yoneyama K.Strongly secure two-pass attribute-based authenticated key exchange[C]∥4th International Conference on Pairing-Based Cryptography,Pairing 2010.Kaga,Japan,2010,7:147-166 [12] LaMacchia B,Lauter K,Mityagin A.Stronger security of authenticated key exchange[C]∥1st International Conference on Provable Security 2007.Wollongong,NSW,Australia,2007,4:1-16 [13] Yoneyama K.Two-party round-optimal session-policy attribute- based authenticated key exchange without random oracles[C]∥14th International Conference on Information Security and Cryptology,ICISC 2011.Seoul,Korea,2012,7259:467-489 [14] 魏江宏,胡学先,刘文芬.多属性机构环境下的属性基认证密钥交换协议[J].电子与信息学报,2012,4(2):451-456 [15] Shamir A.How to share a secret[J].Communications of the ACM,1979,2(11):612-613 |
No related articles found! |
|