1. Fuzzy Identity-Based Encryption
2. Attribute-based encryption for fine-grained access control of encrypted data
3. Analysis of attribute based encryption schemes;Lakshmi R.N.;Int. J. Comput. Sci. Eng. Commun.,2015
4. Decentralizing attribute‐based encryption;Lewko A.;Lecture Notes in Computer Science,2011
5. Survey of attribute based encryption;Qiao Z.;15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNDP),2014