Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering
Reference34 articles.
1. Sahai A, Waters B (2005) Fuzzy identity-based encryption. Advances in Cryptology-EUROCRYPT 3494:457–473
2. Goyal V et al (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp 89–98
3. Wan Z, Liu J, Deng R (2012) HASBE: A hierarchical attribute-based solution for flexible and scalable access control in cloud computing. IEEE Transactions on Information Forensics & Security 7(2):743–754
4. Ge A et al (2012) Threshold ciphertext policy attribute-based encryption with constant size ciphertexts. Information Security and Privacy 7372:336–349
5. Waters B (2011) Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. Public Key Cryptography 6571:53–70
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献