[1] SAHAI A, WATERS B. Fuzzy identity-based encryption [C]//CRAMER R. Advances in Cryptology—EUROCRYPT 2005, LNCS 3494. Berlin: Springer, 2005:457-473. [2] GOYAL V, PANDEY O, SAHAI A, et al. Attribute-based encryption for fine-grained access control of encrypted data [C]//Proceedings of the 13th ACM Conference on Computer and Communications Security. New York: ACM, 2006:89-98. [3] BETHENCOURT J, SAHAI A, WATERS B. Ciphertext-policy attribute-based encryption [C]//Proceedings of the 2007 IEEE Symposium on Security and Privacy. Washington, DC: IEEE Computer Society, 2007:321-334. [4] 冯登国,陈成.属性密码学研究[J].密码学报,2014,1(1):1-12. (FENG D G, CHEN C. Research on attribute-based cryptography [J]. Journal of Cryptologic Research, 2014,1(1):1-12.) [5] EMURA K, MIYAJI A, NOMURA A, et al. A ciphertext-policy attribute-based encryption scheme with constant ciphertext length [C]//BAO F, LI H, WANG G. Information Security Practice and Experience, LNCS 5451. Berlin: Springer, 2009:13-23. [6] CHEN C, ZHANG Z, FENG D. Efficient ciphertext policy attribute-based encryption with constant-size ciphertext and constant computation-cost [C]//BOYEN X, CHEN X. Provable Security, LNCS 6980. Berlin: Springer, 2011:84-101. [7] HERRANZ J, LAGUILLAUMIE F, RFOLS C. Constant size ciphertexts in threshold attribute-based encryption [C]//NGUYEN P Q, POINTCHEVAL D. Public Key Cryptography—PKC 2010, LNCS 6056. Berlin: Springer, 2010:19-34. [8] ATTRAPADUNG N, LIBERT B, DE PANAFIEU E. Expressive key-policy attribute-based encryption with constant-size ciphertexts [C]//CATALANO D, FAZIO N, GENNARO R, et al. Public Key Cryptography—PKC 2011, LNCS 6571. Berlin: Springer, 2011:90-108. [9] HOHENBERGER S, WATERS B. Attribute-based encryption with fast decryption [C]//KUROSAWA K, HANAOKA G. Public-Key Cryptography—PKC 2013, LNCS 7778. Berlin: Springer, 2013:162-179. [10] WATERS B. Dual system encryption: realizing fully secure IBE and HIBE under simple assumptions [C]//HALEVI S. Advances in Cryptology—CRYPTO 2009, LNCS 5677. Berlin: Springer, 2009:619-636. [11] LEWKO A, OKAMOTO T, SAHAI A, et al. Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption [C]//Proceedings of the 29th Annual International Conference on Theory and Applications of Cryptographic Techniques. Berlin: Springer, 2010:62-91. [12] 李琦,马建峰,熊金波.快速解密的自适应安全KP-ABE方案[J].通信学报,2014,35(Z2):26-32.(LI Q, MA J F, XIONG J B, et al. Adaptively secure key-policy ABE scheme with fast decryption [J]. Journal on Communications, 2014,35(Z2):26-32.) [13] FREEMAN D M. Converting pairing-based cryptosystems from composite-order groups to prime-order groups [C]//GILBERT H. Advances in Cryptology—EUROCRYPT 2010, LNCS 6110. Berlin: Springer, 2010:44-61. [14] LEWKO A. Tools for simulating features of composite order bilinear groups in the prime order setting [C]//POINTCHEVAL D, JOHANSSON T. Advances in Cryptology—EUROCRYPT 2012, LNCS 7237. Berlin: Springer, 2012:318-335. [15] 李琦,马建峰,熊金波,等.一种素数阶群上构造的自适应安全的多授权机构CP-ABE方案[J].电子学报,2014,42(4):696-702.(LI Q, MA J F, XIONG J B, et al. An adaptively secure multi-authority ciphertext-policy ABE scheme on prime order groups [J]. Acta Electronica Sinica, 2014,42(4):696-702.) [16] 李作辉,杨梦梦,陈性元.素数阶群上属性可重复的多授权机构基于属性的加密方案[J].计算机应用,2015,35(8):2189-2194.(LI Z H, YANG M M, CHENG X Y. Attribute repeatable multi-authority attribute-based encryption scheme on prime order group [J]. Journal of Computer Applications, 2015,35(8):2189-2194.) [17] BONEH D, FRANKLIN M. Identity-based encryption from the Weil pairing [C]//KILIAN J. Advances in Cryptology—CRYPTO 2001, LNCS 2139. Berlin: Springer, 2001:213-229. [18] BEIMEL A. Secure schemes for secret sharing and key distribution [D]. Haifa: Israel Institute of Technology, 1996:20-33. |