1. Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Advances in Cryptology—EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22–26, 2005. Proceedings 24, pp. 457–473. Springer, Berlin (2005)
2. Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: 2007 IEEE Symposium on Security and Privacy (SP’07), pp. 321–334. IEEE, Berkeley, CA, USA (2007)
3. Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 89–98. Association for Computing Machinery, Alexandria, Virginia, USA (2006)
4. Ezhilarasi, T., Sudheer Kumar, N., Latchoumi, T., Balayesu, N.: A secure data sharing using IDSS CP-ABE in cloud storage. In: Advances in Industrial Automation and Smart Manufacturing: Select Proceedings of ICAIASM 2019, pp. 1073–1085. Springer, Berlin (2021)
5. Banerjee, S., Roy, S., Odelu, V., Das, A.K., Chattopadhyay, S., Rodrigues, J.J., Park, Y.: Multi-authority CP-ABE-based user access control scheme with constant-size key and ciphertext for IoT deployment. J. Inf. Secur. Appl. 53, 102503 (2020)