[1] SAHAIA,WATERS B.Fuzzy identity-based encryption[C] //International Conference on Theory and Applicection of Crytographic Techniques,Springer-Verlay,2005:457-473. [2] GOYAL V,PANDEY O,SAHAI A,et al.Attribute-based encryption for fine-grained access control encrypted data[C] //Proceeding of the 13thACM Conference on Computer and Communication Security,Alexandria,Virginia,USA,2006:89-98. [3] 刘西蒙,马建峰,熊金波,等.密文策略的权重属性基加密方案[J].西安交通大学学报,2013,47(8):44-48.DOI:10.7652/xjtuxb201308008. LIU X M,MA J F,XIONG J B,et al.Ciphertext-Policy Weighted Attribute Based Encryption Scheme[J].Journal of Xi’AN JIAOTONG University,2013,47(8):44-48.DOI:10.7652/xjtuxb201308008. [4] CHASE M.Multi-authority attribute based encrytion[C] //Proceedings of the Theory of Cryptography Conference,Berlin,Germany:Springer-Verlag,2007:515-534. [5] CHASE M,CHOW S S M.Improving privacy and security in multi-authotity attribute-based encryption[C] //Proceedings of the 16th ACM Conference on Computer and Communications Security,New York,USA:Acm Press,2009:121-130. [6] 陈文聪,张应辉,郑东.基于密文策略的权重多中心属性加密方案[J].桂林电子科技大学学报,2015,35(5):386-390.DOI:10.16725/j.cnki.cn45-1351/tn.2015.05.009. CHEN W C,ZHANG Y H,ZHENG D.Weighted multi-authority attribute encryption based on ciphertext policy[J].Journal of GuiLin University of Electronic Technology,2015,35(5):386-390.DOI:10.16725/j.cnki.cn45-1351/tn.2015.05.009. [7] BEIMEL A.Secure schemes for secret and key distribution[D].Haifa:Technion-Israel Institute of Technology Sivan,1996. [8] BEIMEL A,TASSA T.WEINREB E.Characterzing ideal weighted threshold secret sharing[C] // International Conference on Theory of Cryptography,Springer-verlay,2005:600-619. [9] SHSCHAM H,WATERS B.Efficient ring signatures without random oracles[M].Springer Berlin Heidelberg:Public Key Cryptography-PKC,2007:166-180. [10] DOSHI N,JINWALA D.Constant ciphertext length in multi-authority ciphertext policy attribute based encryption[C] //Computer and Communication Technology(ICCCT),2011 2nd International Conference onIEEE,Springer Berlin Heidelberg,2011,7135(2):515-523. [11] LI J,HUANG Q,CHEN X,et al.Multi-authority ciphertext-policy attribute-based encryption with accountability[Z]. ACM Symposium on Information,Hong Kong,China,2011. [12] HAN J,SUSILO W,MU Y,et al.Privacy-preserving decentralized key-policy attribute-based encryption[J].IEEE Transantions on Parallel &Distributed systems,2012,23(11):2150-2162.DOI:10.1109/TPDS.2012.50. [13] 陈丹伟,刘书雅,李琦.层次化授权机构下的权重属性基加密方案[J].南京邮电大学学报(自然科学版),2016,36(5):18-23.DOI:10.14132/j.cnki.1673-5439.2016.05.003. CHEN D W,LIU S Y,LI Q.Multi-authority hierarchical weighted attribute-based encryption scheme[J].Journal of Nanjing University of Posts and Telecommunications(Natural Science Edition),2016,36(5):18-23.DOI:10.14132/j.cnki.1673-5439.2016.05.003. [14] WANG Y,ZHANG D L,ZHONG H.Multi-authority based weighted attribute encryption scheme in cloud computing[Z].International Conference on Natural Computation,Yantai,China,2014. |