|
[1]
|
Hellmanme, D. (1976) New Directions in Cryptography. IEEE Transactions on Information Theory, 86, 644-654. [Google Scholar] [CrossRef]
|
|
[2]
|
Sahai, A. and Waters, B. (2005) Fuzzy Identity-Based Encryption. Advances in Cryptology: EUROCRYPT 2005, 3494, 457-473. [Google Scholar] [CrossRef]
|
|
[3]
|
Katz, J. and Sahai, A. (2007) Brent Waters: Predicate Encryption Supporting Disjunctions. IACR Cryptology ePrint Archive, 404.
|
|
[4]
|
Ling, S., Nguyen, K., Wang, H.X. and Zhang, J.Y. (2019) Server-Aided Revocable Predicate Encryption: Formalization and Lattice-Based Instantiation. The Computer Journal, 62, 1849-1862. [Google Scholar] [CrossRef]
|
|
[5]
|
Yoshino, M., Kunihiro, N., Naganuma, K. and Sato, H. (2012) Sym-metric Inner-Product Predicate Encryption Based on Three Groups. ProvSec 2012: Provable Security, 7496, 215-234. [Google Scholar] [CrossRef]
|
|
[6]
|
Datta, P., Dutta, R. and Mukhopadhyay, S. (2019) Succinct Predicate and Online-Offline Multi-Input Inner Product Encryptions under Standard Static Assumptions. Journal of In-formation Security and Applications, 48, Article ID: 102353. [Google Scholar] [CrossRef]
|
|
[7]
|
Gay, R., Méaux, P. and Wee, H. (2015) Predicate Encryption for Multi-Dimensional Range Queries from Lattices. Public Key Cryptography, 35, 752-776. [Google Scholar] [CrossRef]
|
|
[8]
|
Katz, J., Maffei, M., Malavolta, G. and Schröder, D. (2017) Subset Predicate Encryption and Its Applications. CANS 2017: Cryptology and Network Securi-ty, 11261, 115-134. [Google Scholar] [CrossRef]
|
|
[9]
|
Datta, P., Okamoto, T. and Takashima, K. (2018) Adaptively Simulation-Secure Attribute-Hiding Predicate Encryption. Advances in Cryptology: ASIACRYPT 2018, 11273, 640-672. [Google Scholar] [CrossRef]
|
|
[10]
|
Attrapadung, N. (2019) Unbounded Dynam-ic Predicate Compositions in Attribute-Based Encryption. Advances in Cryptology: EUROCRYPT 2019, 11476, 34-67. [Google Scholar] [CrossRef]
|