GOYAL V,PANDEY O,SAHAI A,et al.Attribute-based encryption for fine-grained access control of encrypted data[A].CCS2006[C].Alexandria,Virginia:ACM,2006.89-98.
[3]
OSTROVSKY R,SAHAI A,WATERS B.Attribute-based encryption with non-monotonic access structures[A].CCS2007[C].Alexandria,Virginia:ACM,2007.195-203.
[4]
OKAMOTO T,TAKASHIMA K.Fully secure functional encryption with general relations from the decisional linear assumption[A].CRYPTO 2010[C].Berlin:Springer,2010.191-208.
BONEH D,FRANKLIN M.Identity-based encryption from the Weil pairing[A].CRYPTO 2001[C].Berlin:Springer,2001.213-229.
[13]
BEIMEL A.Secure Schemes for Secret Sharing and Key Distribution[D].Haifa,Israel:Israel Institute of Technology,Technion,1996.
[14]
WATERS B.Dual system encryption:Realizing fully secure IBE and HIBE under simple assumptions[A].CRYPTO 2009[C].Berlin:Springer,2009.619-636.
[15]
CHASE M,CHOW S S M.Improving privacy and security in multi-authority attribute-based encryption[A].CCS2009[C].Chicago,Illinois:ACM,2009.121-130.
[16]
MüLLER S,KATZENBEISSER S,ECKERT C.On multi-authority ciphertext-policy attribute-based encryption[J].Bulletin of the Korean Mathematical Society,2009,46(4):803-819.