1 |
A. Sahai and B. Waters, "Fuzzy Identity-based Encryption," Eurocrypt 2005, LNCS 3494, pp. 457-473.
|
2 |
D. Naor, M. Naor and Lotspiech, "Revocation and Tracing Schemes for Stateless Receivers," Crypto 2001, LNCS 2139, pp. 41-62.
|
3 |
N. Attrapadung and H. Imai, "Conjunctive Broadcast and Attribute-based Encryption", Pairing 2009, LNCS 5671, pp. 248-265.
|
4 |
V. Goyal, O. Pandy, A. Sahai and B. Waters, "Attribute-based Encryption for Fine-grained Access Control of Encrypted Data," ACM CCS 2006, pp. 89-98.
|