1. Fuzzy identity-based encryption;Sahai,2005
2. Attribute-based encryption for fine-grained access control of encrypted data;Goyal,2006
3. White-box traceable ciphertext-policy attribute-based encryption supporting any monotone access structures;Liu;IEEE Trans. Inf. ForensicsSecur.,2013
4. Fully collusion-resistant traceable key-policy attribute-based encryption with sub-linear size ciphertexts;Liu,2014
5. Privacy-aware attribute-based encryption with user accountability;Li,2009