[1] SAHAI A, WATERS B. Fuzzy identity-based encryption[C]//Proceedings of the 2005 Annual International Conference on the Theory and Applications of Cryptographic Techniques, LNCS 3494. Berlin:Springer, 2005:457-473. [2] LEWKO A, OKAMOTO T, SAHAI A, et al. Fully secure functional encryption:attribute-based encryption and (hierarchical) inner product encryption[C]//Proceedings of the 29th Annual International Conference on Theory and Applications of Cryptographic Techniques. Berlin:Springer, 2010:62-91. [3] BONEH D, SAHAI A, WATERS B. Functional encryption:definitions and challenges[C]//Proceedings of the 20118th Conference on Theory of Cryptography. Berlin:Springer, 2011:253-273. [4] GOYAL V, PANDEY O, SAHAI A, et al. Attribute-based encryption for fine-grained access control of encrypted data[C]//Proceedings of the 200613th ACM Conference on Computer and Communications Security. New York:ACM, 2006:89-98. [5] KATZ J, SAHAI A, WATERS B. Predicate encryption supporting disjunctions, polynomial equations, and inner products[C]//Proceedings of the 200827th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Berlin:Springer, 2008:146-162. [6] OKAMOTO T, TAKASHIMA K. Fully secure functional encryption with general relations from the decisional linear assumption[C]//Proceedings of the 201030th Annual Conference on Advances in Cryptology. Berlin:Springer, 2010:191-208. [7] ATTRAPADUNG N, LIBERT B. Functional encryption for inner product:achieving constant-size ciphertexts with adaptive security or support for negation[C]//Proceedings of the 2010 IACR International Workshop on Public Key Cryptography, LNCS 6056. Berlin:Springer, 2010:384-402. [8] HUO W Q, PEI J S, ZHANG K, et al. KP-ABE with attribute extension:towards functional encryption schemes integration[C]//Proceedings of the 2014 Sixth International Symposium on Parallel Architectures, Algorithms and Programming. Piscataway, NJ:IEEE, 2014:230-237. [9] GREEN M, HOHENBERGER S, WATERS B. Outsourcing the decryption of ABE ciphertexts[C]//Proceedings of the 201120th USENIX Conference on Security. Berkeley, CA:USENIX Association, 2011:34-1-34-16. [10] QIN B D, DENG R H, LIU S L, et al. Attribute-based encryption with efficient verifiable outsourced decryption[J]. IEEE Transactions on Information Forensics and Security, 2015, 10(7):1384-1393. [11] MAO X P, LAI J Z, MEI Q X, et al. Generic and efficient constructions of attribute-based encryption with verifiable outsourced decryption[J]. IEEE Transactions on Dependable and Secure Computing, 2016, 13(5):533-546. [12] 任艳丽,蔡建兴,黄春水,等.基于身份加密中可验证的私钥生成外包算法[J].通信学报,2015,36(11):61-66.(REN Y L, CAI J X, HUANG C S, et al. Verifiable outsourcing private key generation algorithm in an identity-based encryption scheme[J]. Journal on Communications, 2015, 36(11):61-66.) [13] WATERS B. Functional encryption for regular languages[C]//Proceedings of the 32nd Annual Cryptology Conference on Advances in Cryptology, LNCS 7417. Berlin:Springer, 2012:218-235. [14] MA H, ZHANG R, WAN Z G, et al. Verifiable and exculpable outsourced attribute-based encryption for access control in cloud computing[J]. IEEE Transactions on Dependable and Secure Computing, 2017, 14(6):679-692. [15] 刘梦君,刘树波,王颖,等.基于LSSS共享矩阵无授权策略的属性密码解密效率提高方案[J].电子学报,2015,43(6):1065-1072.(LIU M J, LIU S B, WANG Y, et al. Optimizing the decryption efficiency in LSSS matrix-based attribute-based encryption without given policy[J]. Acta Electronica Sinica, 2015, 43(6):1065-1072.) [16] HOHENBERGER S, WATERS B. Attribute-based encryption with fast decryption[C]//Proceedings of the 201316th International Conference on Practice and Theory in Public-Key Cryptography, LNCS 7778. Berlin:Springer, 2013:162-179. [17] OSTROVSKY R, SAHAI A, WATERS B. Attribute-based encryption with non-monotonic access structures[C]//CCS 07:Proceedings of the 200714th ACM Conference on Computer and Communications Security. New York:ACM, 2007:195-203. |