[1] SHAMIR A. Identity-based cryptosystems and signature schemes [C]//Crypto 1984: Proceedings of CRYPTO 1984 on Advances in Cryptology. Berlin: Springer, 1985: 47-53. [2] GOYAL V, PANDEY O, SAHAI A, et al. Attribute-based encryption for fine grained access control of encrypted data [C]//CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security. New York: ACM, 2006: 89-98. [3] 张星, 文子龙, 沈晴霓, 等.可追责并解决密钥托管问题的属性基加密方案[J]. 计算机研究与发展, 2015, 52(10):2293-2303.(ZHANG X, WEN Z L, SHEN Q N, et al. Accountable attribute-based encryption scheme without key escrow [J]. Journal of Computer Research and Development, 2015, 52(10): 2293-2303.) [4] BONEH D, SILVERBERG A. Applications of multilinear forms to cryptography [J]. Contemporary Mathematics, 2003, 324(1): 71-90. [5] GARG S, GENTRY C, HALEVI S. Candidate multilinear maps from ideal lattices [C]//EUROCRYPT 2013: Proceedings of the 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, LNCS 7881. Berlin: Springer, 2013: 1-17. [6] YE D F, LIU P. Obfuscation without multilinear maps [EB/OL]. [2016-02-20]. http://eprint.iacr.org/2016/095.pdf. [7] CORON J S, LEPOINT T, TIBOUCHI M. Practical multilinear maps over the integers [C]//CRYPTO 2013: Proceedings of the 33rd Annual Cryptology Conference, LNCS 8042. Berlin: Springer, 2013: 476-493. [8] GU C S. Variation of GGH14 multilinear maps[EB/OL]. [2016-02-20]. http://eprint.iacr.org/2015/1245.pdf. [9] CORON J S, LEPOINT T, TIBOUCHI M. New multilinear maps over the integers [C]//CRYPTO 2015: Proceedings of the 35th Annual Cryptology Conference, LNCS 9215. Berlin: Springer, 2015: 267-286. [10] GARG S, GENTRY C, HALEVI S, et al. Attribute-based encryption for circuits from multilinear maps [C]//CRYPTO 2013: Proceedings of the 33rd Annual Cryptology Conference on Advances in Cryptology, LNCS 8043. Berlin: Springer, 2013:479-499. [11] GORBUNOV S, VAIKUNTANATHAN V, WEE H. Attribute-based encryption for circuits [C]//STOC 2013: Proceedings of the 45th Annual Association for Computing Machinery Symposium on Theory of Computing. New York: ACM, 2013: 545-554. [12] ATTRAPADUNG N. Fully secure and succinct attribute-based encryption for circuits from multilinear maps [EB/OL]. [2015-10-10]. http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.690.4361. [13] GARG S, GENTRY C, HALEVI S, et al. Fully secure attribute-based encryption from multilinear maps [EB/OL]. [2015-10-10]. https://eprint.iacr.org/2014/622.pdf. [14] DRAGAN C C, TIPLEA F L. Key-policy attribute-based encryption for general boolean circuits from secret sharing and multilinear maps [C]//BCS 2015: Proceedings of 2015 Cryptography and Information Security in the Balkans. Berlin: Springer, 2015: 112-133. [15] BONEH D, GENTRY C, GORBUNOV S, et al. Fully key-homomorphic encryption, arithmetic circuit ABE, and compact garbled circuits [C]//EUROCRYPT 2014: Proceedings of the 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, LNCS 8441. Berlin: Springer, 2014: 533-556. [16] CHANDRAN N, RAGHURAMAN S, VINAYAGAMURTHY D. Reducing depth in constrained PRFs: from bit-fixing to NC1[C]//PKC 2016: Proceedings of the 19th International Conference on the Theory and Practice of Public-Key Cryptography. Berlin: Springer, 2016: 359-385. [17] DATTA P, DUTTA R, MUKHOPADHYAY S. Compact attribute-based encryption and signcryption for general circuits from multilinear maps [C]//INDOCRYPT 2015: Proceedings of the 16th Progress in Cryptology Conference. Berlin: Springer, 2015: 3-24. [18] HOHENBERGER S, SAHAI A, WATERS B. Full domain Hash from (leveled) multilinear maps and identity-based aggregate signatures [C]//CRYPTO 2013: Proceedings of the 33rd Annual Cryptology Conference, LNCS 8042. Berlin: Springer, 2013: 494-512. [19] BRAKERSKI Z, VAIKUNTANATHAN V. Circuit-ABE from LWE: unbounded attributes and semi-adaptive security [EB/OL]. [2016-02-20]. http://eprint.iacr.org/2016/118.pdf. [20] GREEN M, HOHENBERGER S, WATERS B. Outsourcing the decryption of ABE ciphertexts [C]//SEC 2011: Proceedings of the 20th USENIX Conference on Security. New York: ACM, 2011:34-49. [21] KAWAI Y. Outsourcing the re-encryption key generation: flexible ciphertext-policy attribute-based proxy re-encryption [C]//ISPEC 2015: Proceedings of the 11th Information Security Practice and Experience Conference. Berlin: Springer, 2015: 301-315. [22] ALDEMAN J, JANSON C, CID C, et al. Hybrid publicly verifiable computation [C]//RSA 2016: Proceedings of the 25th CT-RSA Conference 2016. Berlin:Springer, 2016: 147-163. [23] TANG Q A, PEJO B, WANG H S. Protect both integrity and confidentiality in outsourcing collaborative filtering computations [EB/OL]. [2016-02-20]. http://eprint.iacr.org/2016/079.pdf. [24] 王皓, 郑志华, 吴磊, 等.自适应安全的外包CP-ABE方案研究[J]. 计算机研究与发展, 2015, 52(10):2270-2280.(WANG H, ZHENG Z H, WU L, et al. Adaptively secure outsourcing ciphertext-policy attribute-based encryption [J]. Journal of Computer Research and Development, 2015, 52(10): 2270-2280.) [25] 韩益亮, 卢万谊, 杨晓元.支持电路结构的多线性映射属性签密方案[J]. 四川大学学报(工程科学版), 2013, 45(6):27-32.(HAN Y L, LU W Y, YANG X Y, et al. Attribute-based signcryption for circuits from multilinear maps [J]. Journal of Sichuan University (Engineering Science Edition), 2013, 45(6): 27-32.) |