[1] SAHAI A, WATERS B. Fuzzy identity-based encryption[C]//Proceedings of the 24th Annual International Conference on Theory and Applications of Cryptographic Techniques. Berlin:Springer, 2005:457-473. [2] GOYAL V, PANDEY O, SAHAI A, et al. Attribute-based encryption for fine-grained access control of encrypted data[C]//Proceedings of the 13th ACM Conference on Computer and Communications Security. New York:ACM, 2006:89-98. [3] ATTRAPADUNG N. Dual system encryption via doubly selective security:framework, fully secure functional encryption for regular languages, and more[C]//Proceedings of the 2014 Annual International Conference on the Theory and Applications of Cryptographic Techniques. Berlin:Springer, 2014:557-577. [4] YAMADA S, ATTRAPADUNG N, HANAOKA G, et al. Generic constructions for chosen-ciphertext secure attribute based encryption[C]//Proceedings of the 2011 International Workshop on Public Key Cryptography. Berlin:Springer, 2011:71-89. [5] GREEN M, HOHENBERGER S, WATERS B. Outsourcing the decryption of ABE ciphertexts[C]//Proceedings of the 20th USENIX Conference on Security. Berkeley:USENIX Association, 2011:34-34. [6] MAO X, LAI J, MEI Q, et al. Generic and efficient constructions of attribute-based encryption with verifiable outsourced decryption[J]. IEEE Transactions on Dependable and Secure Computing, 2016, 13(5):533-546. [7] LI J, HUANG X, LI J, et al. Securely outsourcing attribute-based encryption with checkability[J]. IEEE Transactions on Parallel and Distributed Systems, 2014, 25(8):2201-2210. [8] PARNO B, RAYKOVA M, VAIKUNTANATHAN V. How to delegate and verify in public:verifiable computation from attribute-based encryption[C]//Proceedings of the 9th International Conference on Theory of Cryptography. Berlin:Springer, 2012:422-439. [9] 陈飞, 韩益亮, 李晓策, 等. 支持通用电路的多线性映射外包属性加密方案[J]. 计算机应用, 2016, 36(10):2747-2752. (CHEN F, HAN Y L, LI X C, et al. Outsourced attribute-based encryption for general circuit from multilinear maps[J]. Journal of Computer Applications, 2016,36(10):2747-2752.) [10] 方雪锋, 王晓明. 可撤销用户的外包加解密CP-ABE方案[J]. 计算机工程, 2016, 42(12):124-128,132. (FANG X F,WANG X M. Outsourced encryption and decryption CP-ABE Scheme with user revocation[J].Computer Engineering,2016,42(12):124-128,132.) [11] LAI J, DENG R H, GUAN C, et al. Attribute-based encryption with verifiable outsourced decryption[J]. IEEE Transactions on Information Forensics and Security, 2013, 8(8):1343-1354. [12] QIN B, DENG R H, LIU S et al. Attribute-based encryption with efficient verifiable outsourced decryption[J]. IEEE Transactions on Information Forensics and Security, 2015, 10(7):1384-1393. [13] ATTRAPADUNG N, LIBERT B, DE PANAFIEU E. Expressive key-policy attribute-based encryption with constant-size ciphertexts[C]//Proceedings of the 14th International Conference on Practice and Theory in Public Key Cryptography Conference on Public Key Cryptography. Berlin:Springer, 2011:90-108. [14] 刘梦君,刘树波,王颖,等.基于LSSS共享矩阵无授权策略的属性密码解密效率提高方案[J].电子学报,2014,43(6):1065-1072.(LIU M J, LIU S B, WANG Y, et al. Optimizing the decryption efficiency in LSSS matrix-based attribute-based encryption without given policy[J].Acta Electronica Sinica,2014,43(6):1065-1072.) [15] WATERS B. Dual system encryption:realizing fully secure IBE and HIBE under simple assumptions[C]//Proceedings of the 29th Annual International Cryptology Conference on Advances in Cryptology. Berlin:Springer-Verlag, 2009:619-636. [16] YAMADA S, ATTRAPADUNG N, HANAOKA G, et al. A framework and compact constructions for non-monotonic attribute-based encryption[C]//PKC 2014:Public Key Cryptography, LNCS8383. Berlin:Springer, 2014:275-292. |