Citation: | XU Peng, TANG Yong, JIANG Wenbin, et al., “Ciphertext-Policy Attribute-Based Encryption with Short Keys,” Chinese Journal of Electronics, vol. 23, no. 4, pp. 655-660, 2014, |
J. Bethencourt, A. Sahai and B. Waters, Ciphertext-policy attribute-based encryption, Proceedings of IEEE Symposium on Security and Privacy, California, Vol.41, No.2, pp.321-334, 2007.
|
Yu Nenghai, Hao Zhuo, Xu Jiajia, Zhang Weiming and Zhang Chi, Review of cloud computing security, Acta Electronica Sinica, Vol.41, No.2, pp.371-381, 2013.
|
Cheng Hongbing, Rong Chunming, Tan Zhenghua and Zeng Qingkai, Identity based encryption and biometric authentication scheme for secure data access in cloud computing, Chinese Journal of Electronics, Vol.21, No.2, pp.254-259, 2012.
|
K. Emura, A. Miyaji, A. Nomura, K. Omote and M. Soshi, A ciphertext-policy attribute-based encryption scheme with constant ciphertext length, Proceedings of Information Security Practice and Experience, Xi'an, China, pp.13-23, 2009.
|
Z. Zhou and D. Huang, On efficient ciphertext-policy attri-bute based encryption and broadcast encryption, available at http://eprint.iacr.org/2010/395, 2010.
|
J. Herranz, F. Laguillaumie and C. Ráfols, Constant size ciphertexts in threshold attribute-based encryption, Proceedings of Public Key Cryptography, Paris, Springer, pp.19-34, 2010.
|
C. Chen, Z. Zhang and D. Feng, Efficient ciphertext policy attribute-based encryption with constant-size ciphertext and constant computation-cost, Proceedings of Provable Security, Xi'an, Springer, pp.84-101, 2011.
|
A. Sahai and B. Waters, Fuzzy identity-based encryption, Proceedings of Advances in Cryptology-Eurocrypt, Denmark, Springer, pp.457-473, 2005.
|
V. Goyal, O. Pandey, A. Sahai and B. Waters, Attribute-based encryption for fine-grained access control of encrypted data, Proceedings of the 13th ACM Conference on Computer and Commuications Security, New York, ACM, pp.89-98, 2006.
|
L. Cheung and C-C. Newport, Provably secure ciphertext policy ABE, Proceedings of the 14th ACM conference on Computer and Communications Security, New York, ACM, pp.456-465, 2007.
|
V. Goyal, A. Jain, O. Pandey and A. Sahai, Bounded ciphertext policy attribute based encryption, Proceedings of Automata, Languages and Programming, Reykjavik, Iceland, pp.579-591, 2008.
|
T. Nishide, K. Yoneyama and K. Ohta, Attribute-based encryption with partially hidden encryptor-specified access structures, Proceedings of Applied Cryptography and Network Security, New York, Springer, pp.111-129, 2008.
|
V. Daza, J. Herranz, P. Morillo and C. Ráfols, Extended access structures and their cryptographic applications, available at http://eprint.iacr.org/2008/502, 2008.
|
B. Waters, Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization, available at http://eprint.iacr.org/2008/290, 2008.
|
J.Katz, A.Sahai and B.Waters, Predicate encryption supporting disjunctions, polynomial equations, and inner products, Proceedings of Adavances in Cryptology-Eurocrypt, Turkey, Springer, pp.146-162, 2008.
|
C. Delerablée and D. Pointcheval, Dynamic threshold public-key encryption, Proceedings of Advances in Cryptology-Crypto, California, Springer, pp.317-334, 2008.
|