[1] SAHAI A, WATERS B. Fuzzy Identity-based Encryption[C]//Lecture Notes in Computer Science: 3494. Heidelberg: Springer Verlag, 2005: 457-473.
[2] CHASE M. Multi-authority Attribute Based Encryption[C]//Lecture Notes in Computer Science: 4392. Heidelberg: Springer Verlag, 2007: 515-534.
[3] CHASE M, CHOW S S M. Improving Privacy and Security in Multi-authority Attribute-based Encryption[C]//Proceedings of the 2009 ACM Confenence of Computer and Communication Security. New York: ACM, 2009: 121-130.
[4] HAN J G, SUSILO W, MU Y, et al. Improving Privacy and Security in Decentralized Ciphertext-policy Attribute-based Encryption[J]. IEEE Transactions on Information Forensics and Security, 2015, 10 (3): 665-678.
[5] YING Z B, LI H, MA J F, et al. Adaptively Secure Ciphertext-policy Attribute-based Encryption with Dynamic Policy Updating[J]. Science China-Information Sciences, 2016, 59(4): 042701.
[6] 应作斌, 马建峰, 崔江涛. 支持位置验证和策略变更的属性加密方案[J]. 西安电子科技大学学报, 2017, 44(2): 57-62.
YING Zuobin, MA Jianfeng, CUI Jiangtao. Attribute-based Encryption with Location Verification and Policy Adjusting Supporting the Cloud Mobile Office[J]. Journal of Xidian University, 2017, 44(2): 57-62.
[7] REGEV O. On Lattices, Learning with Errors, Random Linear Codes, and Cryptography[C]//Proceedings of the 2005 Annual ACM Symposium on Theory of Computing. New York: ACM, 2005: 84-93.
[8] 汤永利, 胡明星, 刘琨, 等. 新的格上基于身份的全同态加密方案[J]. 通信学报, 2017, 38(5): 39-47.
TANG Yongli, Hu Mingxing, LIU Kun, et al. Novel Identity-based Fully Homomorphic Encryption Scheme from Lattice[J]. Journal on Communications, 2017, 38(5): 39-47.
[9] AGRAWAL S, BOYEN X, VAIKUNTANATHAN V, et al. Functional Encryption for Threshold Functions (or Fuzzy IBE) from Lattices[C]//Lecture Notes in Computer Science: 7293. Heidelberg: Springer Verlag, 2012: 280-297.
[10] BOYEN X. Attribute-based Functional Encryption on Lattices[C]//Lecture Notes in Computer Science: 7785. Heidelberg: Springer Verlag, 2013: 122-142.
[11] LIU X, MA J, XIONG J, et al. Threshold Attribute-based Encryption with Attribute Hierarchy for Lattices in the STandard Model[J]. IET Information Security, 2014, 8(4): 217-223.
[12] ZHAO J, GAO H, ZHANG J. Attribute-Based Encryption for Circuits on Lattices[J]. Tsinghua Science and Technology, 2014, 19(5): 463-469.
[13] WANG Y. Lattice Ciphertext Policy Attribute-based Encryption in the Standard Model[J]. International Journal of Network Security, 2014, 16(6): 444-451.
[14] 吴立强, 杨晓元, 韩益亮. 基于理想格的高效模糊身份加密方案[J]. 计算机学报, 2015, 38(4): 775-782.
WU Liqiang, YANG Xiaoyuan, HAN Yiliang. An Efficient FIBE Scheme Based on Ideal Lattices[J]. Chinese Journal of Computers, 2015, 38(4): 775-782.
[15] ZHANG G Y, QIN J, QAZI S. Multi-authority Attribute-based Encryption Scheme from Lattices[J]. Journal of Universal Computer Science, 2015, 21(3): 483-501.
[16] 闫玺玺, 刘媛, 胡明星, 等. 云环境下基于LWE的多机构属性基加密方案[J]. 信息网络安全, 2017(9):128-133.
YAN Xixi, LIU Yuan, HU Mingxing, et al. LWE-based Multi-authority Attribute-based Encryption Scheme in Cloud Environment [J]. Netinfo Security, 2017(9): 128-133.
[17] GENTRY C, PEIKERT C, VAIKUNTANATHAN V. Trapdoors for Hard Lattice and New Cryptographic Constructions[C]//Proceedings of the 2008 Annual ACM Symposium on Theory of Computing. New York: ACM, 2008: 197-206.
[18] AGRAWAL S, BONEH D, BOYEN X. Lattice Basis Delegation in Fixed Dimension and Shorter-ciphertext Hierarchical IBE[C]//Lecture Notes in Computer Science: 6223. Heidelberg: Springer Verlag, 2010: 98-115. |