1. Sahai, A., and Waters, B. (2005, January 22–26). Fuzzy identity-based encryption. Proceedings of the Advances in Cryptology—EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark.
2. Bethencourt, J., Sahai, A., and Waters, B. (2007, January 20–23). Ciphertext-policy attribute-based encryption. Proceedings of the 2007 IEEE Symposium on Security and Privacy (SP’07), Berkeley, CA, USA.
3. Zhou, Z., and Huang, D. (2012, January 22–26). Efficient and secure data storage operations for mobile cloud computing. Proceedings of the 2012 8th International Conference on Network and Service Management (cnsm) and 2012 Workshop on Systems Virtualiztion Management (svm), Las Vegas, NV, USA.
4. Li, J., Jia, C., Li, J., and Chen, X. (2012, January 29–31). Outsourcing encryption of attribute-based encryption with mapreduce. Proceedings of the Information and Communications Security: 14th International Conference, ICICS 2012, Hong Kong, China.
5. Attribute-based encryption scheme with fast encryption;Luo;J. Softw.,2020