1. Fuzzy identity-based encryption;Sahai,2005
2. V. Goyal, O. Pandey, A. Sahai, B. Waters, Attribute-based encryption for fine-grained access control of encrypted data, in: Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006, pp. 89–98.
3. Ciphertext-policy attribute-based encryption;Bethencourt,2007
4. Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization;Waters,2011
5. New proof methods for attribute-based encryption: Achieving full security through selective techniques;Lewko,2012