1. Sahai, A., and Waters, B. (2005, January 22–26). Fuzzy identity-based encryption. Proceedings of the Advances in Cryptology—EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark.
2. Goyal, V., Pandey, O., Sahai, A., and Waters, B. (November, January 30). Attribute-based encryption for fine-grained access control of encrypted data. Proceedings of the 13th ACM Conference on Computer and Communications Security, Alexandria, VA, USA.
3. Waters, B. (2011, January 6–9). Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization. Proceedings of the International Workshop on Public Key Cryptography, Taormina, Italy.
4. Feng, T., Kong, F., Liu, C., and Lu, Y. (2023). Multi-Authorization Attribute-Based Verifiable Encryption Scheme Based on Blockchain. Mob. Netw. Appl., 1–8.
5. Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic cash system. Decentralized Bus. Rev., 1–9.