Author:
Wu Qing,Meng Guoqiang,Zhang Leyou,Rezaeibagha Fatemeh
Funder
National Natural Science Foundation of China
Key Research and Development Projects of Shaanxi Province
Reference45 articles.
1. Space/time trade-offs in hash coding with allowable errors;Bloom;Commun. ACM,1970
2. Boneh, D., Boyen, X., 2004. Short signatures without random oracles. In: Advances in Cryptology-EUROCRYPT 2004: International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2–6, 2004. Proceedings 23, Springer, 2004, pp. 56–73. http://eprint.iacr.org/2004/171.
3. Chase, M., 2007. Multi-authority attribute based encryption. In: Conference on Theory of Cryptography.
4. An efficient and expressive ciphertext-policy attribute-based encryption scheme with partially hidden access structures, revisited;Cui,2018
5. Multiauthority cp-abe-based access control model for iot-enabled healthcare infrastructure;Das;IEEE Trans. Industr. Inf.,2023
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献