Author:
Zhao Yang,Ke Xing-Yu,Pang Yu-Wei,Xiong Hu,Zhu Guo-Bin,Yeh Kuo-Hui
Publisher
Springer Nature Switzerland
Reference26 articles.
1. Beimel, A., et al.: Secure schemes for secret sharing and key distribution (1996)
2. Lecture Notes in Computer Science;M Bellare,2014
3. Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: 2007 IEEE Symposium on Security and Privacy (SP 2007), pp. 321–334. IEEE (2007)
4. Lecture Notes in Computer Science;D Boneh,2001
5. Lecture Notes in Computer Science;D Boneh,2005