References
- R. S. Sandhu and P. Samarati, "Access Control: Principles and Practice.", Communications Magazine, IEEE, vol. 32, no. 9, pp. 40-48, 1994.
- A. Kapadia, P. P. Tsang, and S. W. Smith. "Attribute-based publishing with hidden credentials and hidden policies." in Proceedings of The 14th Annual Network and Distributed System Security Symposium (NDSS), pp. 179-192, 2007.
- M. Pirretti, P. Traynor, P. McDaniel and B. Waters, "Secure attribute-based systems." in Proceedings of the 13th ACM conference on Computer and communications security, pp. 99-112, 2006.
- A. Sahai and B. Waters, "Fuzzy identity-based encryption", EUROCRYPT, Lecture Notes in Computer Science, vol 3494, pp. 457-473. Springer, 2005.
- V. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attribute-based encryption for fine-grained access control of encrypted data." in Proceedings of the 13th ACM conference on Computer and communications security, CCS'06, (New York, NY, USA), pp. 89-98, ACM, 2006.
- J. Bethencourt, A. Sahai, and B. Waters, "Ciphertext-policy attribute-based encryption." in IEEE Symposium on Security and Privacy, pp. 321-334, IEEE Computer Society, 2007.
- L. Ibraimi, Q. Tang, P. Hartel, and W. Jonker, "Efficient and provable secure ciphertext-policy attribute-based encryption schemes." in Proceedings of the 5th International Conference on Information Security Practice and Experience, ISPEC '09, (Berlin, Heidelberg), pp. 1-12, Springer-Verlag, 2009.
- B. Waters, "Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization." in Proceedings of the 14th international conference on Practice and theory in public key cryptography conference on Public key cryptography, PKC'11, (Berlin, Heidelberg), pp. 53-70, Springer-Verlag, 2011.
- R. Ostrovsky, A. Sahai, and B. Waters, "Attribute-based encryption with non-monotonic access structures." in Proceedings of the 14th ACM conference on Computer and communications security, pp. 195-203, 2007.
- Goyal, V., Jain, A., Pandey, O., & Sahai, A.. "Bounded ciphertext policy attribute based encryption". In Automata, Languages and Programming, pp.579-591, Springer Berlin Heidelberg, 2008.
- L. Cheung and C. Newport, "Provably secure ciphertext policy ABE," in Proceedings of the 14th ACM conference on Computer and communications security, CCS '07, (New York, NY, USA), pp. 456-465, ACM, 2007.
- T. Okamoto and K. Takashima, "Fully secure functional encryption with general relations from the decisional linear assumption." in Advances in Cryptology CRYPTO 2010 (T. Rabin, ed.), vol. 6223 of Lecture Notes in Computer Science, pp. 191-208, Springer Berlin, Heidelberg, 2010.
- Huang, Dijiang, and Mayank Verma, "ASPE: attribute-based secure policy enforcement in vehicular ad hoc networks." Ad Hoc Networks, Vol 7, no. 8, pages 1526-1535, 2009. https://doi.org/10.1016/j.adhoc.2009.04.011
- Liang, X., Barua, M., Lu, R., Lin, X., & Shen, X. S.. "Healthshare: Achieving secure and privacy-preserving health information sharing through health social networks.", Computer Communications, vol 35, no 15, pp. 1910-1920, 2012. https://doi.org/10.1016/j.comcom.2012.01.009
- Koo, D., Hur, J., & Yoon, H. "Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage.", Computers & Electrical Engineering, vol 39, no 1, pp 34-46, 2013. https://doi.org/10.1016/j.compeleceng.2012.11.002
- A. Beimel, Secure schemes for secret sharing and key distribution. PhD thesis, Israel Institute of Technology, 1996.
- V. Shoup. "Lower bounds for discrete logarithms and related problems". In EUROCRYPT, pp. 256-266, 1997.
- M. Bellare and P. Rogaway. Random oracles are practical: A paradigm for designing efficient protocols. In ACM conference on Computer and Communications Security (ACM CCS), pp. 62-73, 1993.