[1]Damgrd I, Haagh H, Orlandi C. Access control encryption: Enforcing information flow with cryptography[C] Proc of the 14th Int Conf on Theory of Cryptography. Berlin: Springer, 2016: 547576[2]Boneh D, Franklin K. Identitybased encryption from the Weil pairing[C] Proc of the 21st Annual Int Cryptology Conf. Berlin: Springer, 2001: 213229[3]Agrawal S, Boneh D, Boyen X. Efficient lattice (H)IBE in the standard model[C] Proc of the 29th Annual Int Conf on the Theory and Applications of Cryptographic Techniques. Berlin: Springer, 2010: 553572[4]Dttling N, Garg S. Identitybased encryption from the DiffieHellman assumption[C] Proc of the 37th Annual Int Cryptology Conf. Berlin: Springer, 2017: 537569[5]Goyal V, Pandey O, Sahai A, et al. Attributebased encryption for finegrained access control of encrypted data[C] Proc of the 13th ACM Conf on Computer and Communications Security. New York: ACM, 2006: 8998[6]Waters B. Ciphertextpolicy attributebased encryption: An expressive, efficient, and provably secure realization[C] Proc of the 14th Int Conf on Practice and Theory in Public Key Cryptography. Berlin: Springer, 2011: 5370[7]Hohenberger S, Lu G, Waters B, et al. Registered attributebased encryption[C] Proc of the 42nd Annual Int Conf on the Theory and Applications of Cryptographic Techniques. Berlin: Springer, 2023: 511542[8]Badertscher C, Matt C, Maurer U. Strengthening access control encryption[C] Proc of the 23rd Int Conf on the Theory and Applications of Cryptology and Information Security. Berlin: Springer, 2017: 502532[9]Naor M, Yung M. Publickey cryptosystems provably secure against chosen ciphertext attacks[C] Proc of the 22nd Annual ACM Symp on Theory of Computing. New York: ACM, 1990: 427437[10]Fuchsbauer G, Gay R, Kowalczyk L, et al. Access control encryption for equality, comparison, and more[C] Proc of the 20th IACR Int Conf on Practice and Theory in PublicKey Cryptography. Berlin: Springer, 2017: 88118[11]Brakerski Z, Gentry C, Vaikuntanathan V. (Leveled) fully homomorphic encryption without bootstrapping(Leveled) fully homomorphic encryption without bootstrapping[C] Proc of the Innovations in Theoretical Computer Science. New York: ACM, 2012: 309325[12]Regev O. On lattices, learning with errors, random linear codes, and cryptography[C] Proc of the 37th Annual ACM Symp on Theory of Computing. New York: ACM, 2005: 8493[13]Gentry C, Peikert C, Vaikuntanathan V. Trapdoors for hard lattices and new cryptographic constructions[C] Proc of the 40th Annual ACM Symp on Theory of Computing. Berlin: Springer, 2008: 197206[14]Waters B. Efficient identitybased encryption without random oracles[C] Proc of the 24th Annual Int Conf on the Theory and Applications of Cryptographic Techniques. Berlin: Springer, 2005: 114127[15]Canetti R, Halevi S, Katz J. Chosenciphertext security from identitybased encryption[C] Proc of the Int Conf on the Theory and Applications of Cryptographic Techniques. Berlin: Springer, 2004: 207222[16]Kim S, Wu D. Access control encryption for general policies from standard assumptions[C] Proc of the 23rd Int Conf on the Theory and Applications of Cryptology and Information Security. Berlin: Springer, 2017: 471501[17]Agrawal S, Wu D. Functional encryption: Deterministic to randomized functions from simple assumptions[C] Proc of the 36th Annual Int Conf on the Theory and Applications of Cryptographic Techniques. Berlin: Springer, 2017: 3061[18]Goyal V, Jain A, Koppula V, et al. Functional encryption for randomized functionalities[C] Proc of the 12th Theory of Cryptography Conf. Berlin: Springer, 2015: 325351[19]Tan Gaosheng, Zhang Rui, Ma Hui, et al. Access control encryption based on LWE[C] Proc of the 4th ACM Int Workshop on ASIA PublicKey Cryptography. Berlin: Springer, 2017: 4350[20]Gentry C, Sahai A, Waters B. Homomorphic encryption from learning with errors: Conceptuallysimpler, asymptoticallyfaster, attributebased[C] Proc of the 33rd Annual Cryptology Conf. Berlin: Springer, 2013: 7592[21]Teranishi I, Oyama T, Ogata W. General conversion for obtaining strongly existentially unforgeable signature[C] Proc of the 7th Int Conf Cryptology in India. Berlin: Springer, 200: 191205
|