1. Fuzzy Identity-Based Encryption;Amit,2005
2. Multi-linear Secret-sharing Schemes;Amos,2014
3. A UCONABC resilient authorization evaluation for cloud computing;Arlindo;IEEE Trans. Parallel Distr. Syst.,2014
4. Dynamic searchable symmetric encryption with minimal leakage and efficient updates on commodity hardware;AŠila,2015
5. Attribute-based encryption supporting direct/indirect revocation modes;Attrapadung,2009