Affiliation:
1. Harbin Institute of Technology, Shenzhen Graduate School; Shenzhen 518055 China
2. Shenzhen Applied Technology Engineering Laboratory for Internet Multimedia Application; Shenzhen China
3. Guangdong Provincial Key Laboratory of High Performance Computing; Guangzhou China
4. Public Service Platform of Mobile Internet Application Security Industry; Shenzhen 518055 China
5. Fujian Normal University; Fuzhou 350108 China
6. Nanjing University of Information Science and Technology; Nanjing 210044 Jiangsu China
7. Department of Computer Science; The University of Hong Kong; Hong Kong China
8. School of Information Science and Technology; The University of Tokyo; Tokyo Japan
Funder
National High Technology Research and Development Program of China
National Natural Science Foundation of China
Natural Science Foundation of Guangdong Province, China
International Exchange and Cooperation Foundation of Shenzhen City, China
Shenzhen Applied Technology Engineering Laboratory for Internet Multimedia Application of Shenzhen Development and Reform Commission
Public Service Platform of Mobile Internet Application Security Industry of Shenzhen Development and Reform Commission
Guangdong Provincial Key Laboratory of High Performance Computing
Shenzhen Engineering Laboratory of Performance Robots at Digital Stage
Shenzhen Development and Reform Commission
Program for New Century Excellent Talents in Fujian University
Distinguished Young Scholars Fund of Fujian
Subject
Computational Theory and Mathematics,Computer Networks and Communications,Computer Science Applications,Theoretical Computer Science,Software
Reference47 articles.
1. Fuzzy identity-based encryption;Sahai;Advances in Cryptology (EUROCRYPT'05), LNCS,2005
2. Bethencourt J Sahai A Waters B Ciphertext-policy attribute-based encryption IEEE Symposium on Security and Privacy (SP'07) Oakland, California, USA 2007 321 334
3. Cheung L Newport C Provably secure ciphertext policy ABE 14th ACM Conference on Computer and Communications Security (CCS'07) Alexandria, Virginia, USA 2007 456 465
4. Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization;Waters;Public Key Cryptography (PKC'11),,LNCS 2011
5. Goyal V Pandey O Sahai A Waters B Attribute-based encryption for fine-grained access control of encrypted data 13th ACM Conference on Computer and Communications Security (CCS'06) Alexandria, Virginia, USA 2006 89 98
Cited by
14 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献