[1]ATENIESE G, KIRSCH J, BLANTON M. Secret handshakes with dynamic and fuzzy matching [C]// NDSS 2007: Proceedings of the Network and Distributed System Security Symposium. San Diego: USENIX Association, 2007: 159-177.[2]WANG H, XU Q, BAN T. A provably secure two-party attribute-based key agreement protocol [C]// Proceedings of Intelligent Information Hiding and Multimedia Signal Processing. Washington, DC: IEEE Computer Society, 2009: 1042-1045.[3]BIRKETT J, STEBILA D. Predicate-based key exchange [C]// Proceedings of Australasian Conference on Information Security and Privacy. Berlin: Springer-Verlag, 2010: 282-299.[4]WATERS B. Ciphertext-policy attribute-based encryption: An ex-pressive, efficient, and provably secure realization [C]// PKC'11: Proceedings of the 14th International Conference on Practice and Theory in Public Key Cryptography Conference on Public Key Cryptography. Berlin: Springer-Verlag, 2011: 53-70.[5]YONEYAMA K. Strongly secure two-pass attribute-based authenticated key exchange [C]// Pairing'10: Proceedings of the 4th International Conference on Pairing-based Cryptography. Berlin: Springer-Verlag, 2010: 147-166.[6]LEWKO A, OKAMOTO T, SAHAI A, et al. Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption [C]// Advances in Cryptology-EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Berlin: Springer-Verlag, 2010: 62-91.[7]LAMACCHIA B, LAUTER K, MITYAGIN A. Stronger security of authenticated key exchange [C]// ProvSec'07: Proceedings of the 1st International Conference on Provable Security. Berlin: Springer-Verlag, 2007: 1-16.[8]BEIMEL A. Secure schemes for secret sharing and key distribution [D]. Haifa: Israel Institute of Technology, 1996.[9]WATERS B. Dual system encryption: Realizing fully secure IBE and HIBE under simple assumptions [C]// Advances in Cryptology-CRYPTO 2009, 29th Annual International Cryptology Conference. Berlin: Springer-Verlag, 2009: 619-636.[10]OKAMOTO T, POINTCHEVAL D. The gap-problems: A new class of problems for the security of cryptographic schemes [C]// PKC 2001: Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography. Berlin: Springer-Verlag, 2001: 104-118.