2W Difl'ie, M E HelL, nan.New directions in cryptography [J],IEEE Trans on Inf. Theory,1976,22(6): 644-654. 被引量:1
3R L Rivest,A Shamir, L Adleman. A method for obtaining digital signatures and public key cryptosystem [C]. Comm. ACM. 1978. 21: 120-126. 被引量:1
4D Boneh, M K Franklin. Identlty-based eneryption from the well pairing[C]. CRYPTO, 2001,213-229. 被引量:1
5Sahai A, Waters B. Fuzzy identity based encryption[C]. Advances in Cryptology (EUROCRYPT 2005). Lecture Notes in Computer Sci- ence(3494),Berlin: Springer-Verlag, 2005.457.-473. 被引量:1
6Bethencourt J, $ahai A, Waters B. Ciphertext-policy at- tribute-based encryption[C].Proceedings of IEEE Symposium on Se- curity and Privacy,2007.321-334. 被引量:1
7Attrapadung N, Imai H. Dual-Policy Attribute Based Encryption [C]. Proceedings of Applied Cryptography and Network Security. Lecture Notes in Computer Science (5536), Berlin: $pringer-Verlag, 2009.168-185. 被引量:1
8Cuo Z Z, Li M C, Cui Y R, Fan X X. Dynamic mu|ti-attribute based encryption [J]JDCTA: International Journal of Digital Content Technology and its Applications, 2011, Vol. 5: 281-289. 被引量:1