References
- D. Boneh and M. K. Franklin, "Identity-based encryption from the weil pairing," Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology, Santa Barbara: CA, pp. 213-229, 2001.
- X. Boyen and B. Waters, "Anonymous hierarchical identity-based encryption," Proceedings of the 26th Annual International Cryptology Conference on Advances in Cryptology, Santa Barbara: CA, pp. 290-307, 2006.
- A. Sahai and B. Waters, "Fuzzy identity-based encryption," Proceedings of the 24th Annual International Conference on Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, pp. 457-473, 2005.
- V. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attribute-based encryption for fine-grained access control of encrypted data," Proceedings of the 13th ACM Conference on Computer and Communications Security, Alexandria: VA, pp. 89-98, 2006.
- L. Cheung and C. Newport, "Provably secure ciphertext policy ABE," Proceedings of the 14th ACM conference on Computer and Communications Security, Alexandria: VA, pp. 456-465, 2007.
- V. Goyal, A. Jain, O. Pandey, and A. Sahai, "Bounded ciphertext policy attribute based encryption," Proceedings of the 35th international colloquium on Automata, Languages and Programming, Reykjavik, Iceland, pp. 579-591, 2008.
- J. Bethencourt, A. Sahai, and B. Waters, "Ciphertext-policy attribute-based encryption," Proceedings of the 2007 IEEE Symposium on Security and Privacy, Oakland: CA, pp. 321-334, 2007.
- X. Liang, Z. Cao, H. Lin, and J. Shao, "Attribute based proxy reencryption with delegating capabilities," Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, Sidney, Australia, pp. 276-286, 2009.
- K. Emura, A. Miyaji, A. Nomura, K. Omote, and M. Soshi, "A ciphertext policy attribute-based encryption scheme with constant ciphertext length," Proceedings of the 5th International Conference on Information Security Practice and Experience, Shaanxi, China, pp. 13-23, 2009.
- R. Canetti and S. Hohenberger, "Chosen-ciphertext secure proxy re-encryption," Proceedings of the 14th ACM Conference on Computer and Communications Security, Alexandria: VA, pp. 185-194, 2007.
- T. Nishide, K. Yoneyama, and K. Ohta, "Attribute-based encryption with partially hidden encryptor-specified access structures," Proceedings of the 6th International Conference on Applied Cryptography and Network Security, New York: NY, pp. 111-129, 2008.
- B. Waters, "Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization," Proceedings of the 14th International Conference on Practice and Theory in Public Key Cryptography Conference on Public Key Cryptography, Taormina, Italy, pp. 53-70, 2008.
Cited by
- A Survey of Research Progress and Development Tendency of Attribute-Based Encryption vol.2014, pp.1537-744X, 2014, https://doi.org/10.1155/2014/193426
- Efficient and Adaptively Secure Attribute-Based Proxy Reencryption Scheme vol.12, pp.5, 2016, https://doi.org/10.1155/2016/5235714
- Verifiable attribute-based proxy re-encryption for secure public cloud data sharing vol.9, pp.12, 2016, https://doi.org/10.1002/sec.1446
- A robust cryptographic-based system for secure data sharing in cloud environments vol.9, pp.18, 2017, https://doi.org/10.1002/sec.1770
- ZigBee Security Using Attribute-Based Proxy Re-encryption vol.10, pp.4, 2012, https://doi.org/10.6109/jicce.2012.10.4.343
- CP-ABE Access Control that Block Access of Withdrawn Users in Dynamic Cloud vol.14, pp.10, 2012, https://doi.org/10.3837/tiis.2020.10.012