[1]Goyal V, Pandey O, Sahai A, et al. Attributebased encryption for finegrained access control of encrypted data[C]∥Proc of CCS’06, 2006:8998.
[2]Sahai A, Waters B. Fuzzy identitybased encryption[C]∥Proc of Advances in CryptologyEUROCRYPT,2005:457473.
[3]Bethencourt J,Sahai A,Waters B. Ciphertextpolicy attributebased encryption[C]∥Proc of the 28th IEEE Symposium on Security and Privacy,2007:321334.
[4]Cheung L,Newport C.Provably secure ciphertext policy ABE[C]∥Proc of the 14th ACM Conference on Computer and Communications Security( ACMCCS), 2007:456465.
[5]Goyal V, Jain A, Pandey O, et al. Bounded ciphertext policy attributebased encryption[C]∥Proc of the 35th International Colloquium on Automata, Languages and Programming, Part II,2008:579591.
[6]Bethencourt J, Sahai A, Waters B. Ciphertextpolicy attributebased encryption[C]∥Proc of IEEE Symposium on Security and Privacy, 2007:321334.
[7]Pirretti M, Traynor P, McDaniel P, et al. Secure attribute based systems[C]∥Proc of the 13th ACM Conference on Computer and Communications Security, 2006:99112.
[8]Ostrovsky R, Sahai A, Waters B. Attribute based encryption with nonmonotonic access structures[C]∥ACM Conference on Computer and Communications Security ( ACM CCS), 2007:1.
[9]Lee B, Kim K. Fair exchange of digital signatures using conditional signature[C]∥Proc of the 2002 Symposium on Cryptography and Information Security(SCIS’02), 2002:179184.
[10]Berta I Z, Buttyn L, Vajda I. Migrating the untrusted terminal problem using conditional signatures[C]∥Proc of International Conference on Information Technology:Coding and Computing(ITCC’04), 2004:1216.
[11]Klonowski M, Kutylowski M, Lauks A,et al. Conditional digital signatures[C]∥Proc of the 2nd International Conference on Trust Bus,2005:206215. |