References
- Sahai, A. and B. Waters., "Fuzzy identity-based encryption," in Proc. of International Conference on Theory and Applications of Cryptographic Techniques. 2005.
- Bethencourt, J., A. Sahai, and B. Waters, "Ciphertext-Policy Attribute-Based Encryption," in Proc. of IEEE Symposium on Security and Privacy, 2007.
- Chase, M., "Multi-authority attribute based encryption," in Proc. of Conference on Theory of Cryptography, 2007.
- Cheung, L. and C. Newport, "Provably secure ciphertext policy ABE," in Proc. of ACM Conference on Computer and Communications Security, 2007.
- Goyal, V., et al., "Bounded Ciphertext Policy Attribute Based Encryption," DBLP, pp. 579-591, 2008.
- Goyal, V., et al., "Attribute-based encryption for fine-grained access control of encrypted data," in Proc. of CCS '06 Proceedings of the 13th ACM conference on Computer and communications security, pp. 89-98, 2006.
- Han, J., et al., "Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-Based Encryption," IEEE Transactions on Information Forensics & Security, vol. 10, no. 3, p. 665-678, 2015. https://doi.org/10.1109/TIFS.2014.2382297
- Horvath, M., "Attribute-Based Encryption Optimized for Cloud Computing," Infocommunications Journal, vol. 7, no. 2, pp. 1-9, 2014.
- Lewko, A. and B. Waters, "Decentralizing Attribute-Based Encryption," in Proc. of Advances in Cryptology - EUROCRYPT 2011 - International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings. 2011.
- Longo, R., C. Marcolla, and M. Sala, "Key-Policy Multi-authority Attribute-Based Encryption," in Proc. of International Conference on Algebraic Informatics, vol. 9270, pp. 152-164, 2016.
- Phuong, T.V.X., et al., "Attribute Based Broadcast Encryption with Short Ciphertext and Decryption Key," Springer International Publishing, 2015.
- Rouselakis, Y. and B. Waters, "Practical constructions and new proof methods for large universe attribute-based encryption," in Proc. of ACM Sigsac Conference on Computer & Communications Security, 2013.
- Yuan, Q., C. Ma, and J. Lin, "Fine-Grained Access Control for Big Data Based on CP-ABE in Cloud Computing," Springer Berlin Heidelberg, pp. 344-352, 2015.
- Li, J., et al., "Ciphertext-Policy Attribute-Based Encryption with Hidden Access Policy and Testing," Ksii Transactions on Internet & Information Systems, vol. 10, no. 7, 2016.
- Jiang, Y., et al., "Flexible ciphertext-policy attribute-based encryption supporting AND-gate and threshold with short ciphertexts," International Journal of Information Security, pp. 1-13, 2017.
- Guan, Z., et al., "Conditional Ciphertext-Policy Attribute-Based Encryption Scheme in Vehicular Cloud Computing," Mobile Information Systems, pp. 1-10, 2016.
- Malluhi, Q.M., V.C. Trinh, and V.C. Trinh, "A Ciphertext-Policy Attribute-based Encryption Scheme With Optimized Ciphertext Size And Fast Decryption," in Proc. of ACM on Asia Conference on Computer and Communications Security, 2017.
- Ostrovsky, R., A. Sahai, and B. Waters, "Attribute-based encryption with non-monotonic access structures," in Proc. of Ccs 07 Acm Conference on Computer & Communications Security, 2007.
- Naor, M. and B. Pinkas, "Efficient trace and revoke schemes," International Journal of Information Security, vol. 9, no. 6, pp. 411-424, 2010. https://doi.org/10.1007/s10207-010-0121-2
- Sadikin, R., S.J. Moon, and Y.H. Park, "Ciphertext Policy-Attribute Based Encryption with Non Monotonic Access Structures," Journal of The Institue of Elcetronic Engineers of Korea, vol. 50, no. 9, p. 21-31, 2013.
- Yamada, S., et al., "A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption," 2014: Springer Berlin Heidelberg, p. 275-292, 2014.
- Wang, Y., et al., "CP-ABE Based Access Control for Cloud Storage," 2017: Springer International Publishing, 2017.
- Waters, B., "Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions," in Proc. of International Cryptology Conference on Advances in Cryptology, 2009.
- Okamoto, T. and K. Takashima, "Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption," in Proc. of CRYPTO, 2010.
- Lewko, A., et al, "Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption," in Proc. of Advances in Cryptology - EUROCRYPT 2010, International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, May 30 - June 3, 2010. Proceedings, 2010.
- Lewko, A. and B. Waters, "New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques," 2012: Springer Berlin Heidelberg, p. 180-198, 2012.
- Yang, X., et al, "Fully Secure Attribute-Based Encryption with Non-monotonic Access Structures," in Proc. of International Conference on Intelligent NETWORKING and Collaborative Systems, 2013.