References
- Dongyoung Koo, Junbeom Hur, and Hyunsoo Yoon, "Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage," Computers & Electrical Engineering, vol. 39, no. 1, pp. 34-46, 2013. https://doi.org/10.1016/j.compeleceng.2012.11.002
- Boneh, D. and Franklin, M, "Identity-Based Encryption from the Weil Pairing," SIAM Journal on Computing, vol. 32, no. 3, pp. 586-615, 2003. https://doi.org/10.1137/S0097539701398521
- Boyen, Xavier and Brent Waters, "Anonymous hierarchical identity-based encryption (without random oracles)." CRYPTO2006, pp. 290-307, 2006.
- Park, J. H., and Lee D. H.. "A hidden vector encryption scheme with constant-size tokens and pairing computations," IEICE transactions on fundamentals of electronics, communications and computer sciences, vol. 93, no. 9, pp. 1620-1631, 2010.
- Park, J. H., Lee, K., Susilo, W., and Lee, D. H., "Fully secure hidden vector encryption under standard assumptions," Information Sciences, vol. 232, pp. 188-207, 2013. https://doi.org/10.1016/j.ins.2012.12.034
- De Caro, Angelo, Vincenzo Iovino, and Giuseppe Persiano. "Fully secure hidden vector encryption," Pairing-Based Cryptography-Pairing 2012. pp. 102-121, 2013.
- Katz, Jonathan, Amit Sahai, and Brent Waters. "Predicate encryption supporting disjunctions, polynomial equations, and inner products," EUROCRYPT2008, pp. 146-162, 2008.
- Agrawal, Shweta, David Mandell Freeman, and Vinod Vaikuntanathan. "Functional encryption for inner product predicates from learning with errors," ASIACRYPT2011, pp. 21-40, 2011.
- Lewko, Allison, et al. "Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption," EUROCRYPT2010, pp. 62-91, 2010.
- Attrapadung, Nuttapong, and Benoit Libert. "Functional encryption for inner product: Achieving constant-size ciphertexts with adaptive security or support for negation," Public Key Cryptography-PKC 2010, pp 384-402, 2010.
- Okamoto, Tatsuaki, and Katsuyuki Takashima. "Fully secure functional encryption with general relations from the decisional linear assumption," CRYPTO2010, pp. 191-208, 2010.
- Okamoto, Tatsuaki, and Katsuyuki Takashima. "Adaptively attribute-hiding (hierarchical) inner product encryption," EUROCRYPT2012, pp. 591-608, 2012.
- Okamoto, Tatsuaki, and Katsuyuki Takashima. "Fully secure unbounded inner-product and attribute-based encryption," ASIACRYPT2012, pp. 349-366, 2012.
- Okamoto, Tatsuaki and, Katsuyuki Takashima, "Efficient (Hierarchical) Inner-Product Encryption Tightly Reduced from the Decisional Linear Assumption," IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol. E96-A, no. 1, pp. 42-52, 2013. https://doi.org/10.1587/transfun.E96.A.42
- Boneh, Dan, et al. "Chosen-ciphertext security from identity-based encryption," SIAM Journal on Computing, vol. 36, no. 5, pp. 1301-1328, 2006.
- Waters, Brent. "Dual system encryption: Realizing fully secure IBE and HIBE under simple assumptions," CRYPTO2009, pp. 619-636, 2009.
- Lewko, Allison, and Brent Waters. "Unbounded HIBE and attribute-based encryption," EUROCRYPT2011, pp. 547-567, 2011.
- De Caro, Angelo, Vincenzo Iovino, and Giuseppe Persiano. "Fully secure anonymous hibe and secret-key anonymous ibe with short ciphertexts," Pairing-Based Cryptography- Pairing 2010, pp. 347-366, 2010.
- Freeman, David Mandell. "Converting pairing-based cryptosystems from compositeorder groups to prime-order groups," EUROCRYPT2010, pp. 44-61, 2010.