conference on Computer and communications security.
Alexandria, Virginia, USA: ACM.
Emura, K., Miyaji, A., Nomura, A., Omote, K. & Soshi,
M. 2009. A Ciphertext-Policy Attribute-Based
Encryption Scheme with Constant Ciphertext Length.
In: BAO, F., LI, H. & WANG, G. (eds.) Information
Security Practice and Experience. Springer Berlin
Heidelberg.
Goyal, V., Jain, A., Pandey, O. & Sahai, A. 2008.
Bounded Ciphertext Policy Attribute Based
Encryption. In: ACETO, L., DAMG RD, I.,
GOLDBERG, L., HALLD RSSON, M., ING LFSD
TTIR, A. & WALUKIEWICZ, I. (eds.) Automata,
Languages and Programming. Springer Berlin
Heidelberg.
Goyal, V., Pandey, O., Sahai, A. & Waters, B. 2006.
Attribute-based encryption for fine-grained access
control of encrypted data. Proceedings of the 13th
ACM conference on Computer and communications
security. Alexandria, Virginia, USA: ACM.
Ibraimi, L., Tang, Q., Hartel, P. & Jonker, W. 2009.
Efficient and Provable Secure Ciphertext-Policy
Attribute-Based Encryption Schemes. In: BAO, F., LI,
H. & WANG, G. (eds.) Information Security Practice
and Experience. Springer Berlin Heidelberg.
Junbeom, H. & Dong Kun, N. 2011. Attribute-Based
Access Control with Efficient Revocation in Data
Outsourcing Systems. Parallel and Distributed
Systems, IEEE Transactions on, 22, 1214-1221.
Junod, P. & Karlov, A. 2010. An efficient public-key
attribute-based broadcast encryption scheme allowing
arbitrary access policies. Proceedings of the tenth
annual ACM workshop on Digital rights management.
Chicago, Illinois, USA: ACM.
Lang, B., Foster, I., Siebenlist, F., Ananthakrishnan, R. &
Freeman, T. 2009. A Flexible Attribute Based Access
Control Method for Grid Computing. Journal of Grid
Computing, 7, 169-180.
Lewko, A., Okamoto, T., Sahai, A., Takashima, K. &
Waters, B. 2010. Fully Secure Functional Encryption:
Attribute-Based Encryption and (Hierarchical) Inner
Product Encryption. In: GILBERT, H. (ed.) Advances
in Cryptology – EUROCRYPT 2010. Springer Berlin
Heidelberg.
Li, J., Wang, Q., Wang, C. & Ren, K. 2011. Enhancing
Attribute-Based Encryption with Attribute Hierarchy.
Mobile Networks and Applications, 16, 553-561.
Liang, X., Cao, Z., Lin, H. & Shao, J. 2009a. Attribute
based proxy re-encryption with delegating capabilities.
Proceedings of the 4th International Symposium on
Information, Computer, and Communications Security.
Sydney, Australia: ACM.
Liang, X., Cao, Z., Lin, H. & Xing, D. 2009b. Provably
secure and efficient bounded ciphertext policy
attribute based encryption. Proceedings of the 4th
International Symposium on Information, Computer,
and Communications Security. Sydney, Australia:
ACM.
Nishide, T., Yoneyama, K. & Ohta, K. 2008. Attribute-
Based Encryption with Partially Hidden Encryptor-
Specified Access Structures. In: Bellovin, S., Gennaro,
R., Keromytis, A. & Yung, M. (eds.) Applied
Cryptography and Network Security. Springer Berlin
Heidelberg.
Sahai, A. & Waters, B. 2005. Fuzzy Identity-Based
Encryption. In: CRAMER, R. (ed.) Advances in
Cryptology – EUROCRYPT 2005. Springer Berlin
Heidelberg.
Sam
arati, P. & Di Vimercati, S. D. C. Data protection in
outsourcing scenarios: Issues and directions.
Proceedings of the 5th ACM Symposium on
Information, Computer and Communications Security,
2010. ACM, 1-14.
Shamir, A. 1979. How to share a secret. Commun. ACM,
22, 612-613.
Shamir, A. 1985. Identity-based cryptosystems and
signature schemes. Proceedings of CRYPTO 84 on
Advances in cryptology. Santa Barbara, California,
United States: Springer-Verlag New York, Inc.
Su, J., Cao, D., Wang, X., Sun, Y. & Hu, L. 2011.
Attribute-based Encryption Schemes. Journal of
Software, 22, 1299-1315.
Vimercati, S. D. C. D., Foresti, S., Jajodia, S., Paraboschi,
S. & Samarati, P. 2010. Encryption policies for
regulating access to outsourced data. ACM
Transactions on Database Systems (TODS), 35, 12.
Wang, G., Liu, Q. & Wu, J. 2010. Hierarchical attribute-
based encryption for fine-grained access control in
cloud storage services. Proceedings of the 17th ACM
conference on Computer and communications security.
Chicago, Illinois, USA: ACM.
Waters, B. 2011. Ciphertext-Policy Attribute-Based
Encryption: An Expressive, Efficient, and Provably
Secure Realization. In: Catalano, D., Fazio, N.,
Gennaro, R. & Nicolosi, A. (eds.) Public Key
Cryptography – PKC 2011. Springer Berlin
Heidelberg.
Zhiguo, W., Jun'e, L. & Deng, R. H. 2012. HASBE: A
Hierarchical Attribute-Based Solution for Flexible and
Scalable Access Control in Cloud Computing.
Information Forensics and Security, IEEE
Transactions on, 7, 743-754.
ExtendingtheCiphertext-PolicyAttributeBasedEncryptionSchemeforSupportingFlexibleAccessControl
157