Author:
Luo Chao,Shi Jiaoli,Xie Minchen,Hu Chao,Wang Lihua,Mei Zhuolin,Yao Shimao,Li Hui
Publisher
Springer Nature Singapore
Reference28 articles.
1. Liu, Z., Jiang, Z.L., Wang, X., Xinyi Huang, S.M., Yiu, K.S.: Offline/online attribute‐based encryption with verifiable outsourced decryption. Concurrency Comput. Pract. Exp. 29(7), e3915 (2017). https://doi.org/10.1002/cpe.3915
2. Yang, K., Jia, X., Ren, K., Zhang, B.: DAC-MACS: effective data access control for multi-authority cloud storage systems. In: Proceedings of the 2013 IEEE INFOCOM, Turin, Italy (2013)
3. Li, L., Gu, T., Chang, L., Xu, Z., Qian, J.: Expressive ciphertext-policy attribute-based encryption scheme with fast decryption and constant-size secret keys. J. Electron. Inf. Technol. 40(7), 1661–1668 (2018)
4. Lecture Notes in Computer Science;A Shamir,1985
5. Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. SIAM J. Comput. 32(3), 586–615 (2003)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献